Changeset 273819 in webkit
- Timestamp:
- Mar 3, 2021 9:14:52 AM (3 years ago)
- Location:
- trunk/LayoutTests
- Files:
-
- 57 added
- 57 deleted
- 74 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/LayoutTests/ChangeLog
r273818 r273819 1 2021-03-03 Chris Gambrell <cgambrell@apple.com> 2 3 [LayoutTests] Convert http/tests/misc convert PHP to Python 4 https://bugs.webkit.org/show_bug.cgi?id=221981 5 <rdar://problem/74399686> 6 7 Reviewed by Jonathan Bedard. 8 9 * http/tests/fetch/fetch-in-worker.js: 10 * http/tests/misc/401-alternative-content-expected.txt: 11 * http/tests/misc/401-alternative-content.php: Removed. 12 * http/tests/misc/401-alternative-content.py: Added. 13 * http/tests/misc/async-script-removed.html: 14 * http/tests/misc/async-script.html: 15 * http/tests/misc/authentication-redirect-1/authentication-sent-to-redirect-cross-origin-expected.txt: 16 * http/tests/misc/authentication-redirect-1/authentication-sent-to-redirect-cross-origin.html: 17 * http/tests/misc/authentication-redirect-1/resources/auth-echo.php: Removed. 18 * http/tests/misc/authentication-redirect-1/resources/auth-echo.py: Added. 19 * http/tests/misc/authentication-redirect-1/resources/auth-then-redirect.php: Removed. 20 * http/tests/misc/authentication-redirect-1/resources/auth-then-redirect.py: Added. 21 * http/tests/misc/authentication-redirect-2/authentication-sent-to-redirect-same-origin-expected.txt: 22 * http/tests/misc/authentication-redirect-2/authentication-sent-to-redirect-same-origin.html: 23 * http/tests/misc/authentication-redirect-2/resources/auth-echo.php: Removed. 24 * http/tests/misc/authentication-redirect-2/resources/auth-echo.py: Added. 25 * http/tests/misc/authentication-redirect-2/resources/auth-then-redirect.php: Removed. 26 * http/tests/misc/authentication-redirect-2/resources/auth-then-redirect.py: Added. 27 * http/tests/misc/authentication-redirect-3/authentication-sent-to-redirect-same-origin-with-location-credentials-expected.txt: 28 * http/tests/misc/authentication-redirect-3/authentication-sent-to-redirect-same-origin-with-location-credentials.html: 29 * http/tests/misc/authentication-redirect-3/resources/auth-echo.php: Removed. 30 * http/tests/misc/authentication-redirect-3/resources/auth-echo.py: Added. 31 * http/tests/misc/authentication-redirect-3/resources/auth-then-redirect-with-url-credentials.php: Removed. 32 * http/tests/misc/authentication-redirect-3/resources/auth-then-redirect-with-url-credentials.py: Added. 33 * http/tests/misc/authentication-redirect-3/resources/auth-then-redirect.php: Removed. 34 * http/tests/misc/authentication-redirect-3/resources/auth-then-redirect.py: Added. 35 * http/tests/misc/authentication-redirect-4/authentication-sent-to-redirect-same-origin-url-expected.txt: 36 * http/tests/misc/authentication-redirect-4/authentication-sent-to-redirect-same-origin-url.html: 37 * http/tests/misc/authentication-redirect-4/resources/auth-echo.php: Removed. 38 * http/tests/misc/authentication-redirect-4/resources/auth-echo.py: Added. 39 * http/tests/misc/authentication-redirect-4/resources/auth-then-redirect.php: Removed. 40 * http/tests/misc/authentication-redirect-4/resources/auth-then-redirect.py: Added. 41 * http/tests/misc/bad-charset-alias.html: 42 * http/tests/misc/before-unload-load-image.html: 43 * http/tests/misc/char-encoding-bocu-1-blocklisted.html: 44 * http/tests/misc/char-encoding-in-hidden-charset-field-default.html: 45 * http/tests/misc/char-encoding-in-hidden-charset-field-with-Big5.html: 46 * http/tests/misc/char-encoding-in-hidden-charset-field-with-EUC-JP.html: 47 * http/tests/misc/char-encoding-in-hidden-charset-field-with-ISO-2022-JP.html: 48 * http/tests/misc/char-encoding-in-hidden-charset-field-with-Shift_JIS.html: 49 * http/tests/misc/char-encoding-in-hidden-charset-field-with-accept-charset.html: 50 * http/tests/misc/char-encoding-in-hidden-charset-field-with-get-method.html: 51 * http/tests/misc/char-encoding-in-hidden-charset-field-with-one-field.html: 52 * http/tests/misc/char-encoding-in-text-charset-field-with-value.html: 53 * http/tests/misc/char-encoding-scsu-blocklisted.html: 54 * http/tests/misc/char-encoding-without-charset-field.html: 55 * http/tests/misc/charset-sniffer-end-sniffing.html: 56 * http/tests/misc/css-reject-any-type-in-strict-mode-expected.txt: 57 * http/tests/misc/css-reject-any-type-in-strict-mode.html: 58 * http/tests/misc/dns-prefetch-control.html: 59 * http/tests/misc/embed-image-load-outlives-gc-without-crashing.html: 60 * http/tests/misc/empty-file-formdata.html: 61 * http/tests/misc/extract-http-content-language-against-equiv.php: Removed. 62 * http/tests/misc/extract-http-content-language-against-equiv.py: Added. 63 * http/tests/misc/extract-http-content-language-malformed.php: Removed. 64 * http/tests/misc/extract-http-content-language-malformed.py: Added. 65 * http/tests/misc/extract-http-content-language-multiple.php: Removed. 66 * http/tests/misc/extract-http-content-language-multiple.py: Added. 67 * http/tests/misc/extract-http-content-language.php: Removed. 68 * http/tests/misc/extract-http-content-language.py: Added. 69 * http/tests/misc/form-blob-challenge.html: 70 * http/tests/misc/form-post-textplain-cross-site.html: 71 * http/tests/misc/form-post-textplain.html: 72 * http/tests/misc/form-submit-file-cross-site-redirect.html: 73 * http/tests/misc/form-submit-file-cross-site.html: 74 * http/tests/misc/image-checks-for-accept.html: 75 * http/tests/misc/image-error.html: 76 * http/tests/misc/image-input-type-outlives-gc-without-crashing.html: 77 * http/tests/misc/image-load-outlives-gc-without-crashing.html: 78 * http/tests/misc/javascript-url-stop-loaders.html: 79 * http/tests/misc/large-js-program.php: Removed. 80 * http/tests/misc/large-js-program.py: Added. 81 * http/tests/misc/location-with-space.php: Removed. 82 * http/tests/misc/location-with-space.py: Added. 83 * http/tests/misc/mask-image-accept.html: 84 * http/tests/misc/object-image-error.html: 85 * http/tests/misc/object-image-load-outlives-gc-without-crashing.html: 86 * http/tests/misc/redirect-to-about-blank.html: 87 * http/tests/misc/redirect-to-external-url-expected.txt: 88 * http/tests/misc/redirect-with-quotes.php: Removed. 89 * http/tests/misc/redirect-with-quotes.py: Added. 90 * http/tests/misc/redirect.php: Removed. 91 * http/tests/misc/redirect.py: Added. 92 * http/tests/misc/referrer.html: 93 * http/tests/misc/refresh-headers.php: Removed. 94 * http/tests/misc/refresh-headers.py: Added. 95 * http/tests/misc/resources/3rd-level-iframe-with-blocking-resource.php: Removed. 96 * http/tests/misc/resources/3rd-level-iframe-with-blocking-resource.py: Added. 97 * http/tests/misc/resources/404image.php: Removed. 98 * http/tests/misc/resources/404image.py: Added. 99 * http/tests/misc/resources/SVGFont-delayed-loader.svg: 100 * http/tests/misc/resources/bad-charset-alias.php: Removed. 101 * http/tests/misc/resources/bad-charset-alias.py: Added. 102 * http/tests/misc/resources/basic-echo-post.php: Removed. 103 * http/tests/misc/resources/basic-echo-post.py: Added. 104 * http/tests/misc/resources/bocu-1-cyrillic.php: Removed. 105 * http/tests/misc/resources/bocu-1-cyrillic.py: Added. 106 * http/tests/misc/resources/char-encoding-in-hidden-charset-field.php: Removed. 107 * http/tests/misc/resources/char-encoding-in-hidden-charset-field.py: Added. 108 * http/tests/misc/resources/charset-sniffer-end-sniffing.php: Removed. 109 * http/tests/misc/resources/charset-sniffer-end-sniffing.py: Added. 110 * http/tests/misc/resources/check-keygen-post.php: Removed. 111 * http/tests/misc/resources/check-keygen-post.py: Added. 112 * http/tests/misc/resources/check-test-file.php: Removed. 113 * http/tests/misc/resources/check-test-file.py: Added. 114 * http/tests/misc/resources/check-unnamed-file-included-in-formdata.php: Removed. 115 * http/tests/misc/resources/check-unnamed-file-included-in-formdata.py: Added. 116 * http/tests/misc/resources/delayed-log.php: Removed. 117 * http/tests/misc/resources/delayed-log.py: Added. 118 * http/tests/misc/resources/dns-prefetch-control.php: Removed. 119 * http/tests/misc/resources/dns-prefetch-control.py: Added. 120 * http/tests/misc/resources/echo-query-param.php: Removed. 121 * http/tests/misc/resources/echo-query-param.py: Added. 122 * http/tests/misc/resources/form-post-textplain.php: Removed. 123 * http/tests/misc/resources/form-post-textplain.py: Added. 124 * http/tests/misc/resources/hang-connection.php: Removed. 125 * http/tests/misc/resources/hang-connection.py: Added. 126 * http/tests/misc/resources/image-checks-for-accept.php: Removed. 127 * http/tests/misc/resources/image-checks-for-accept.py: Added. 128 * http/tests/misc/resources/nested-iframe-loading-another-iframe.html: 129 * http/tests/misc/resources/protected/protected-image.php: Removed. 130 * http/tests/misc/resources/protected/protected-image.py: Added. 131 * http/tests/misc/resources/random-no-store.php: Removed. 132 * http/tests/misc/resources/random-no-store.py: Added. 133 * http/tests/misc/resources/redirect-result.php: Removed. 134 * http/tests/misc/resources/redirect-result.py: Added. 135 * http/tests/misc/resources/redirect-step2.php: Removed. 136 * http/tests/misc/resources/redirect-step2.py: Added. 137 * http/tests/misc/resources/redirect-step3.php: Removed. 138 * http/tests/misc/resources/redirect-step3.py: Added. 139 * http/tests/misc/resources/redirect-step4.php: Removed. 140 * http/tests/misc/resources/redirect-step4.py: Added. 141 * http/tests/misc/resources/redirect-to-about-blank.php: Removed. 142 * http/tests/misc/resources/redirect-to-about-blank.py: Added. 143 * http/tests/misc/resources/redirect-to-external-url-iframe.html: 144 * http/tests/misc/resources/redirect-to-external-url.php: Removed. 145 * http/tests/misc/resources/redirect-to-external-url.py: Added. 146 * http/tests/misc/resources/referrer-main-resource.php: Removed. 147 * http/tests/misc/resources/referrer-main-resource.py: Added. 148 * http/tests/misc/resources/referrer-result.php: Removed. 149 * http/tests/misc/resources/referrer-result.py: Added. 150 * http/tests/misc/resources/script-500.php: Removed. 151 * http/tests/misc/resources/script-500.py: Added. 152 * http/tests/misc/resources/scsu-cyrillic.php: Removed. 153 * http/tests/misc/resources/scsu-cyrillic.py: Added. 154 * http/tests/misc/resources/send-async-xhr.html: 155 * http/tests/misc/resources/slowimage.php: Removed. 156 * http/tests/misc/resources/slowimage.py: Added. 157 * http/tests/misc/resources/stylesheet-bad-mime-type.php: Removed. 158 * http/tests/misc/resources/stylesheet-bad-mime-type.py: Added. 159 * http/tests/misc/resources/webtiming-cross-origin-and-back-redirect1.php: Removed. 160 * http/tests/misc/resources/webtiming-cross-origin-and-back-redirect1.py: Added. 161 * http/tests/misc/resources/webtiming-cross-origin-and-back-redirect2.php: Removed. 162 * http/tests/misc/resources/webtiming-cross-origin-and-back-redirect2.py: Added. 163 * http/tests/misc/script-500.html: 164 * http/tests/misc/script-no-store.html: 165 * http/tests/misc/submit-post-keygen.html: 166 * http/tests/misc/svg-image-load-outlives-gc-without-crashing.html: 167 * http/tests/misc/timer-vs-loading.html: 168 * http/tests/misc/url-in-utf16be.html: 169 * http/tests/misc/url-in-utf16le.html: 170 * http/tests/misc/video-poster-image-load-outlives-gc-without-crashing.html: 171 * http/tests/misc/webtiming-cross-origin-and-back1.html: 172 * http/tests/misc/webtiming-cross-origin-redirect.php: Removed. 173 * http/tests/misc/webtiming-cross-origin-redirect.py: Added. 174 * http/tests/misc/webtiming-one-redirect.php: Removed. 175 * http/tests/misc/webtiming-one-redirect.py: Added. 176 * http/tests/misc/webtiming-slow-load.php: Removed. 177 * http/tests/misc/webtiming-slow-load.py: Added. 178 * http/tests/misc/webtiming-ssl.php: Removed. 179 * http/tests/misc/webtiming-ssl.py: Added. 180 * http/tests/misc/webtiming-two-redirects.php: Removed. 181 * http/tests/misc/webtiming-two-redirects.py: Added. 182 * http/tests/misc/xhtml.php: Removed. 183 * http/tests/misc/xhtml.py: Added. 184 * http/tests/xmlhttprequest/on-network-timeout-error-during-preflight.html: 185 * http/tests/xmlhttprequest/resetting-timeout-to-zero.html: 186 * http/tests/xmlhttprequest/timeout-greater-than-default-network-timeout.html: 187 * platform/gtk/TestExpectations: 188 * platform/ios/TestExpectations: 189 * platform/mac/TestExpectations: 190 * platform/win/TestExpectations: 191 * platform/win/http/tests/loading/basic-auth-load-URL-with-consecutive-slashes-expected.txt: 192 * platform/wk2/http/tests/misc/authentication-redirect-1/authentication-sent-to-redirect-cross-origin-expected.txt: 193 * platform/wk2/http/tests/misc/authentication-redirect-2/authentication-sent-to-redirect-same-origin-expected.txt: 194 * platform/wk2/http/tests/misc/authentication-redirect-3/authentication-sent-to-redirect-same-origin-with-location-credentials-expected.txt: 195 * platform/wk2/http/tests/misc/authentication-redirect-4/authentication-sent-to-redirect-same-origin-url-expected.txt: 196 1 197 2021-03-03 Youenn Fablet <youenn@apple.com> 2 198 -
trunk/LayoutTests/http/tests/fetch/fetch-in-worker.js
r204704 r273819 4 4 return; 5 5 6 var promise1 = fetch("/misc/resources/delayed-log.p hp?delay=100").then(() => {6 var promise1 = fetch("/misc/resources/delayed-log.py?delay=100").then(() => { 7 7 postMessage("FAIL: promise 1 resolved"); 8 8 }, () => { -
trunk/LayoutTests/http/tests/misc/401-alternative-content-expected.txt
r153903 r273819 1 http://127.0.0.1:8000/misc/401-alternative-content.p hp- didReceiveAuthenticationChallenge - Simulating cancelled authentication sheet1 http://127.0.0.1:8000/misc/401-alternative-content.py - didReceiveAuthenticationChallenge - Simulating cancelled authentication sheet 2 2 PASS -
trunk/LayoutTests/http/tests/misc/async-script-removed.html
r120167 r273819 26 26 // All these scripts should be executed after the next script tag. 27 27 var s1 = document.createElement("script"); 28 s1.src = "resources/delayed-log.p hp?delay=3&msg=1";28 s1.src = "resources/delayed-log.py?delay=3&msg=1"; 29 29 s1.async = false; 30 30 document.body.appendChild(s1); 31 31 32 32 var s2 = document.createElement("script"); 33 s2.src = "resources/delayed-log.p hp?delay=2&msg=2";33 s2.src = "resources/delayed-log.py?delay=2&msg=2"; 34 34 s2.async = false; 35 35 document.body.appendChild(s2); 36 36 37 37 var s3 = document.createElement("script"); 38 s3.src = "resources/delayed-log.p hp?delay=1&msg=3&done=1";38 s3.src = "resources/delayed-log.py?delay=1&msg=3&done=1"; 39 39 s3.async = false; 40 40 document.body.appendChild(s3); -
trunk/LayoutTests/http/tests/misc/async-script.html
r145090 r273819 14 14 function test() { 15 15 var s = document.createElement("script"); 16 s.src = "resources/delayed-log.p hp?delay=1&msg=PASS&done=1";16 s.src = "resources/delayed-log.py?delay=1&msg=PASS&done=1"; 17 17 s.async = true; 18 18 document.body.appendChild(s); -
trunk/LayoutTests/http/tests/misc/authentication-redirect-1/authentication-sent-to-redirect-cross-origin-expected.txt
r231450 r273819 1 http://localhost:8000/misc/authentication-redirect-1/resources/auth-then-redirect.p hp?redirect=301 - didReceiveAuthenticationChallenge - Responding with testUser:testPassword1 http://localhost:8000/misc/authentication-redirect-1/resources/auth-then-redirect.py?redirect=301 - didReceiveAuthenticationChallenge - Responding with testUser:testPassword 2 2 https://bugs.webkit.org/show_bug.cgi?id=40138 3 3 You should load this page at 127.0.0.1:8000 so localhost:8000 is considered a different security origin. 4 This test loads a p hpscript which demands http authentication, then uses it to redirect to another script in a different origin that shows what authentication headers were sent with the final request.4 This test loads a py script which demands http authentication, then uses it to redirect to another script in a different origin that shows what authentication headers were sent with the final request. 5 5 It does this once each for HTTP 301, 302, 303, and 307 redirects. 6 6 If not running under DRT, enter any credentials when asked. -
trunk/LayoutTests/http/tests/misc/authentication-redirect-1/authentication-sent-to-redirect-cross-origin.html
r120167 r273819 31 31 { 32 32 i = document.createElement("iframe"); 33 i.setAttribute("src", "http://localhost:8000/misc/authentication-redirect-1/resources/auth-then-redirect.p hp?redirect=" + code);33 i.setAttribute("src", "http://localhost:8000/misc/authentication-redirect-1/resources/auth-then-redirect.py?redirect=" + code); 34 34 i.setAttribute("onload", "frameLoaded()"); 35 35 document.body.appendChild(i); … … 41 41 https://bugs.webkit.org/show_bug.cgi?id=40138<br> 42 42 You should load this page at 127.0.0.1:8000 so localhost:8000 is considered a different security origin.<br> 43 This test loads a p hpscript which demands http authentication, then uses it to redirect to another script in a different origin that shows what authentication headers were sent with the final request.<br>43 This test loads a py script which demands http authentication, then uses it to redirect to another script in a different origin that shows what authentication headers were sent with the final request.<br> 44 44 It does this once each for HTTP 301, 302, 303, and 307 redirects.<br> 45 45 If not running under DRT, enter any credentials when asked.<br> -
trunk/LayoutTests/http/tests/misc/authentication-redirect-2/authentication-sent-to-redirect-same-origin-expected.txt
r231450 r273819 1 http://127.0.0.1:8000/misc/authentication-redirect-2/resources/auth-then-redirect.p hp?redirect=301 - didReceiveAuthenticationChallenge - Responding with testUser:testPassword1 http://127.0.0.1:8000/misc/authentication-redirect-2/resources/auth-then-redirect.py?redirect=301 - didReceiveAuthenticationChallenge - Responding with testUser:testPassword 2 2 https://bugs.webkit.org/show_bug.cgi?id=66354 3 3 You should load this page at 127.0.0.1:8000 because the test relies on redirects within the 127.0.0.1:8000 security origin. 4 This test loads a p hpscript which demands http authentication, then uses it to redirect to another script in the same origin that shows what authentication headers were sent with the final request.4 This test loads a py script which demands http authentication, then uses it to redirect to another script in the same origin that shows what authentication headers were sent with the final request. 5 5 It does this once each for HTTP 301, 302, 303, and 307 redirects. 6 6 If not running under DRT, enter any credentials when asked. -
trunk/LayoutTests/http/tests/misc/authentication-redirect-2/authentication-sent-to-redirect-same-origin.html
r120167 r273819 31 31 { 32 32 i = document.createElement("iframe"); 33 i.setAttribute("src", "http://127.0.0.1:8000/misc/authentication-redirect-2/resources/auth-then-redirect.p hp?redirect=" + code);33 i.setAttribute("src", "http://127.0.0.1:8000/misc/authentication-redirect-2/resources/auth-then-redirect.py?redirect=" + code); 34 34 i.setAttribute("onload", "frameLoaded()"); 35 35 document.body.appendChild(i); … … 41 41 https://bugs.webkit.org/show_bug.cgi?id=66354<br> 42 42 You should load this page at 127.0.0.1:8000 because the test relies on redirects within the 127.0.0.1:8000 security origin.<br> 43 This test loads a p hpscript which demands http authentication, then uses it to redirect to another script in the same origin that shows what authentication headers were sent with the final request.<br>43 This test loads a py script which demands http authentication, then uses it to redirect to another script in the same origin that shows what authentication headers were sent with the final request.<br> 44 44 It does this once each for HTTP 301, 302, 303, and 307 redirects.<br> 45 45 If not running under DRT, enter any credentials when asked.<br> -
trunk/LayoutTests/http/tests/misc/authentication-redirect-3/authentication-sent-to-redirect-same-origin-with-location-credentials-expected.txt
r231450 r273819 1 http://127.0.0.1:8000/misc/authentication-redirect-3/resources/auth-then-redirect-with-url-credentials.p hp?redirect=301 - didReceiveAuthenticationChallenge - Responding with testUser:testPassword1 http://127.0.0.1:8000/misc/authentication-redirect-3/resources/auth-then-redirect-with-url-credentials.py?redirect=301 - didReceiveAuthenticationChallenge - Responding with testUser:testPassword 2 2 https://bugs.webkit.org/show_bug.cgi?id=66354 3 3 You should load this page at 127.0.0.1:8000 because the test relies on redirects within the 127.0.0.1:8000 security origin. 4 This test loads a p hpscript which demands http authentication, then uses it to redirect to another script in the same origin that shows what authentication headers were sent with the final request.4 This test loads a py script which demands http authentication, then uses it to redirect to another script in the same origin that shows what authentication headers were sent with the final request. 5 5 The redirect includes credentials in the location url, and they should be preferred over credentials that WebCore has cached. 6 6 It does this once each for HTTP 301, 302, 303, and 307 redirects. -
trunk/LayoutTests/http/tests/misc/authentication-redirect-3/authentication-sent-to-redirect-same-origin-with-location-credentials.html
r120167 r273819 31 31 { 32 32 i = document.createElement("iframe"); 33 i.setAttribute("src", "http://127.0.0.1:8000/misc/authentication-redirect-3/resources/auth-then-redirect-with-url-credentials.p hp?redirect=" + code);33 i.setAttribute("src", "http://127.0.0.1:8000/misc/authentication-redirect-3/resources/auth-then-redirect-with-url-credentials.py?redirect=" + code); 34 34 i.setAttribute("onload", "frameLoaded()"); 35 35 document.body.appendChild(i); … … 41 41 https://bugs.webkit.org/show_bug.cgi?id=66354<br> 42 42 You should load this page at 127.0.0.1:8000 because the test relies on redirects within the 127.0.0.1:8000 security origin.<br> 43 This test loads a p hpscript which demands http authentication, then uses it to redirect to another script in the same origin that shows what authentication headers were sent with the final request.<br>43 This test loads a py script which demands http authentication, then uses it to redirect to another script in the same origin that shows what authentication headers were sent with the final request.<br> 44 44 The redirect includes credentials in the location url, and they should be preferred over credentials that WebCore has cached.<br> 45 45 It does this once each for HTTP 301, 302, 303, and 307 redirects.<br> -
trunk/LayoutTests/http/tests/misc/authentication-redirect-4/authentication-sent-to-redirect-same-origin-url-expected.txt
r231450 r273819 1 http://127.0.0.1:8000/misc/authentication-redirect-4/resources/auth-then-redirect.p hp?redirect - didReceiveAuthenticationChallenge - Responding with testUser:testPassword1 http://127.0.0.1:8000/misc/authentication-redirect-4/resources/auth-then-redirect.py?redirect - didReceiveAuthenticationChallenge - Responding with testUser:testPassword 2 2 https://bugs.webkit.org/show_bug.cgi?id=105190 3 3 You should load this page at 127.0.0.1:8000 because the test relies on redirects within the 127.0.0.1:8000 security origin. 4 This test loads a p hpscript which demands http authentication, then uses it to redirect via 301 to another script in the same origin that shows what authentication headers were sent with the final request. It verifies that the credentials are not placed in the final URL.4 This test loads a py script which demands http authentication, then uses it to redirect via 301 to another script in the same origin that shows what authentication headers were sent with the final request. It verifies that the credentials are not placed in the final URL. 5 5 If not running under DRT, enter any credentials when asked. 6 6 … … 9 9 Frame: '<!--frame1-->' 10 10 -------- 11 http://127.0.0.1:8000/misc/authentication-redirect-4/resources/auth-echo.p hploaded with HTTP authentication username 'testUser' and password 'testPassword'11 http://127.0.0.1:8000/misc/authentication-redirect-4/resources/auth-echo.py loaded with HTTP authentication username 'testUser' and password 'testPassword' -
trunk/LayoutTests/http/tests/misc/authentication-redirect-4/authentication-sent-to-redirect-same-origin-url.html
r139062 r273819 13 13 { 14 14 i = document.createElement("iframe"); 15 i.setAttribute("src", "http://127.0.0.1:8000/misc/authentication-redirect-4/resources/auth-then-redirect.p hp?redirect");15 i.setAttribute("src", "http://127.0.0.1:8000/misc/authentication-redirect-4/resources/auth-then-redirect.py?redirect"); 16 16 document.body.appendChild(i); 17 17 } … … 22 22 https://bugs.webkit.org/show_bug.cgi?id=105190<br> 23 23 You should load this page at 127.0.0.1:8000 because the test relies on redirects within the 127.0.0.1:8000 security origin.<br> 24 This test loads a p hpscript which demands http authentication, then uses it to redirect via 301 to another script in the same origin that shows what authentication headers were sent with the final request. It verifies that the credentials are not placed in the final URL.<br>24 This test loads a py script which demands http authentication, then uses it to redirect via 301 to another script in the same origin that shows what authentication headers were sent with the final request. It verifies that the credentials are not placed in the final URL.<br> 25 25 If not running under DRT, enter any credentials when asked.<br> 26 26 </body> -
trunk/LayoutTests/http/tests/misc/bad-charset-alias.html
r120167 r273819 30 30 for (i = 0; i < aliases.length; ++i) { 31 31 var ifr = document.createElement("iframe"); 32 ifr.setAttribute("src", "resources/bad-charset-alias.p hp?charset=" + aliases[i]);32 ifr.setAttribute("src", "resources/bad-charset-alias.py?charset=" + aliases[i]); 33 33 document.body.appendChild(ifr); 34 34 } -
trunk/LayoutTests/http/tests/misc/before-unload-load-image.html
r227074 r273819 40 40 return; 41 41 var image = new contentWindow.Image; 42 image.src = "http://127.0.0.1:8000/misc/resources/protected/protected-image.p hp";42 image.src = "http://127.0.0.1:8000/misc/resources/protected/protected-image.py"; 43 43 } 44 44 -
trunk/LayoutTests/http/tests/misc/char-encoding-bocu-1-blocklisted.html
r271043 r273819 23 23 } 24 24 </script> 25 <iframe id="bocu1Frame" src="resources/bocu-1-cyrillic.p hp" onload="run()"></iframe>25 <iframe id="bocu1Frame" src="resources/bocu-1-cyrillic.py" onload="run()"></iframe> 26 26 <script src="../resources/js-test-post.js"></script> 27 27 </body> -
trunk/LayoutTests/http/tests/misc/char-encoding-in-hidden-charset-field-default.html
r174160 r273819 11 11 This should submit _charset_=iso8559-1. Note that this _charset_ input has a value before it submits, which is overwritten. IE6 submits windows1252, because all pages are evidently Unicode in IE6. The point is that it submits the charset we're using, not what exactly it submits.</p> 12 12 13 <form name="testForm" action="resources/char-encoding-in-hidden-charset-field.p hp" method="post">13 <form name="testForm" action="resources/char-encoding-in-hidden-charset-field.py" method="post"> 14 14 <input type=hidden name="_charset_" value="This value should change"> 15 15 <input type=submit> -
trunk/LayoutTests/http/tests/misc/char-encoding-in-hidden-charset-field-with-Big5.html
r120167 r273819 9 9 <p>This should submit one _charset_=Big5</p> 10 10 11 <form id="testForm" action="resources/char-encoding-in-hidden-charset-field.p hp" method="post" accept-charset="Big5">11 <form id="testForm" action="resources/char-encoding-in-hidden-charset-field.py" method="post" accept-charset="Big5"> 12 12 <input type=hidden name="_charset_"> 13 13 <input type=submit> -
trunk/LayoutTests/http/tests/misc/char-encoding-in-hidden-charset-field-with-EUC-JP.html
r120167 r273819 9 9 <p>This should submit one _charset_=EUC-JP</p> 10 10 11 <form id="testForm" action="resources/char-encoding-in-hidden-charset-field.p hp" method="post" accept-charset="EUC-JP">11 <form id="testForm" action="resources/char-encoding-in-hidden-charset-field.py" method="post" accept-charset="EUC-JP"> 12 12 <input type=hidden name="_charset_"> 13 13 <input type=submit> -
trunk/LayoutTests/http/tests/misc/char-encoding-in-hidden-charset-field-with-ISO-2022-JP.html
r120167 r273819 9 9 <p>This should submit one _charset_=ISO-2022-JP</p> 10 10 11 <form id="testForm" action="resources/char-encoding-in-hidden-charset-field.p hp" method="post" accept-charset="ISO-2022-JP">11 <form id="testForm" action="resources/char-encoding-in-hidden-charset-field.py" method="post" accept-charset="ISO-2022-JP"> 12 12 <input type=hidden name="_charset_"> 13 13 <input type=submit> -
trunk/LayoutTests/http/tests/misc/char-encoding-in-hidden-charset-field-with-Shift_JIS.html
r120167 r273819 9 9 <p>This should submit one _charset_=Shift_JIS</p> 10 10 11 <form id="testForm" action="resources/char-encoding-in-hidden-charset-field.p hp" method="post" accept-charset="Shift_JIS">11 <form id="testForm" action="resources/char-encoding-in-hidden-charset-field.py" method="post" accept-charset="Shift_JIS"> 12 12 <input type=hidden name="_charset_"> 13 13 <input type=submit> -
trunk/LayoutTests/http/tests/misc/char-encoding-in-hidden-charset-field-with-accept-charset.html
r120167 r273819 9 9 <p>This should submit two _charset_=UTF-8. IE6 submits windows1252.</p> 10 10 11 <form id="testForm" action="resources/char-encoding-in-hidden-charset-field.p hp" method="post" accept-charset="UTF-8">11 <form id="testForm" action="resources/char-encoding-in-hidden-charset-field.py" method="post" accept-charset="UTF-8"> 12 12 <input type=hidden name="_charset_"> 13 13 <input type=hidden name="_charset_"> -
trunk/LayoutTests/http/tests/misc/char-encoding-in-hidden-charset-field-with-get-method.html
r120167 r273819 9 9 <p>This should submit one _charset_=UTF-8</p> 10 10 11 <form id="testForm" action="resources/char-encoding-in-hidden-charset-field.p hp" accept-charset="UTF-8">11 <form id="testForm" action="resources/char-encoding-in-hidden-charset-field.py" accept-charset="UTF-8"> 12 12 <input type=hidden name="_charset_"> 13 13 <input type=submit> -
trunk/LayoutTests/http/tests/misc/char-encoding-in-hidden-charset-field-with-one-field.html
r120167 r273819 9 9 <p>This should submit one _charset_=UTF-8, for post method and enctype text/plain</p> 10 10 11 <form id="testForm" action="resources/char-encoding-in-hidden-charset-field.p hp" method="post" enctype="text/plain" accept-charset="UTF-8">11 <form id="testForm" action="resources/char-encoding-in-hidden-charset-field.py" method="post" enctype="text/plain" accept-charset="UTF-8"> 12 12 <input type=hidden name="_charset_"> 13 13 <input type=submit> -
trunk/LayoutTests/http/tests/misc/char-encoding-in-text-charset-field-with-value.html
r120167 r273819 9 9 <p>This should submit _charset_=I\'m a little input, short and stout</p> 10 10 11 <form id="testForm" action="resources/char-encoding-in-hidden-charset-field.p hp" method="post">11 <form id="testForm" action="resources/char-encoding-in-hidden-charset-field.py" method="post"> 12 12 <input type=text name="_charset_" value="I'm a little input, short and stout"> 13 13 <input type=submit> -
trunk/LayoutTests/http/tests/misc/char-encoding-scsu-blocklisted.html
r271043 r273819 23 23 } 24 24 </script> 25 <iframe id="scsuFrame" src="resources/scsu-cyrillic.p hp" onload="run()"></iframe>25 <iframe id="scsuFrame" src="resources/scsu-cyrillic.py" onload="run()"></iframe> 26 26 <script src="../resources/js-test-post.js"></script> 27 27 </body> -
trunk/LayoutTests/http/tests/misc/char-encoding-without-charset-field.html
r120167 r273819 9 9 <p>This should submit nothing except the header</p> 10 10 11 <form id="testForm" action="resources/char-encoding-in-hidden-charset-field.p hp" method="post" accept-charset="UTF-8">11 <form id="testForm" action="resources/char-encoding-in-hidden-charset-field.py" method="post" accept-charset="UTF-8"> 12 12 <input type=submit> 13 13 </form> -
trunk/LayoutTests/http/tests/misc/charset-sniffer-end-sniffing.html
r120167 r273819 44 44 <body onload="test()"> 45 45 <pre id="log"></pre> 46 <iframe id="frame" src="resources/charset-sniffer-end-sniffing.p hp"></iframe>46 <iframe id="frame" src="resources/charset-sniffer-end-sniffing.py"></iframe> 47 47 <p>This test is for a bug where the charset sniffer would not stop looking 48 48 for charset if the body contains no tags. Charset sniffer is supposed to stop -
trunk/LayoutTests/http/tests/misc/css-reject-any-type-in-strict-mode-expected.txt
r187489 r273819 1 CONSOLE MESSAGE: Did not parse stylesheet at 'http://127.0.0.1:8000/misc/resources/stylesheet-bad-mime-type.p hp' because non CSS MIME types are not allowed in strict mode.1 CONSOLE MESSAGE: Did not parse stylesheet at 'http://127.0.0.1:8000/misc/resources/stylesheet-bad-mime-type.py' because non CSS MIME types are not allowed in strict mode. 2 2 Related test to http://bugs.webkit.org/show_bug.cgi?id=11451 REGRESSION: Dell.com does not render correctly in ToT (stylesheet not loaded). Making sure that in strict mode we would not load such a stylesheet. 3 3 -
trunk/LayoutTests/http/tests/misc/css-reject-any-type-in-strict-mode.html
r182829 r273819 3 3 <head> 4 4 <title></title> 5 <link rel="stylesheet" href="resources/stylesheet-bad-mime-type.p hp">5 <link rel="stylesheet" href="resources/stylesheet-bad-mime-type.py"> 6 6 <script> 7 7 function test() -
trunk/LayoutTests/http/tests/misc/dns-prefetch-control.html
r120167 r273819 54 54 <script>emitFrameForScheme("ftp:")</script> 55 55 <script>emitFrameForHost("%")</script> 56 <iframe src="resources/dns-prefetch-control.p hp"></iframe>57 <iframe src="resources/dns-prefetch-control.p hp?value=on"></iframe>58 <iframe src="https://127.0.0.1:8443/misc/resources/dns-prefetch-control.p hp?value=on"></iframe>56 <iframe src="resources/dns-prefetch-control.py"></iframe> 57 <iframe src="resources/dns-prefetch-control.py?value=on"></iframe> 58 <iframe src="https://127.0.0.1:8443/misc/resources/dns-prefetch-control.py?value=on"></iframe> 59 59 </div> 60 60 … … 62 62 63 63 <div> 64 <iframe src="resources/dns-prefetch-control.p hp?value=off"></iframe>65 <iframe src="resources/dns-prefetch-control.p hp?value=foo"></iframe>66 <iframe src="https://127.0.0.1:8443/misc/resources/dns-prefetch-control.p hp"></iframe>67 <iframe src="https://127.0.0.1:8443/misc/resources/dns-prefetch-control.p hp?value=off"></iframe>68 <iframe src="https://127.0.0.1:8443/misc/resources/dns-prefetch-control.p hp?value=foo"></iframe>69 <iframe src="data:text/html,<meta http-equiv='x-dns-prefetch-control' value='off'><iframe src='http://127.0.0.1:8000/misc/resources/dns-prefetch-control.p hp'></iframe>"></iframe>70 <iframe src="data:text/html,<meta http-equiv='x-dns-prefetch-control' value='on'><iframe src='https://127.0.0.1:8443/misc/resources/dns-prefetch-control.p hp'></iframe>"></iframe>64 <iframe src="resources/dns-prefetch-control.py?value=off"></iframe> 65 <iframe src="resources/dns-prefetch-control.py?value=foo"></iframe> 66 <iframe src="https://127.0.0.1:8443/misc/resources/dns-prefetch-control.py"></iframe> 67 <iframe src="https://127.0.0.1:8443/misc/resources/dns-prefetch-control.py?value=off"></iframe> 68 <iframe src="https://127.0.0.1:8443/misc/resources/dns-prefetch-control.py?value=foo"></iframe> 69 <iframe src="data:text/html,<meta http-equiv='x-dns-prefetch-control' value='off'><iframe src='http://127.0.0.1:8000/misc/resources/dns-prefetch-control.py'></iframe>"></iframe> 70 <iframe src="data:text/html,<meta http-equiv='x-dns-prefetch-control' value='on'><iframe src='https://127.0.0.1:8443/misc/resources/dns-prefetch-control.py'></iframe>"></iframe> 71 71 </div> 72 72 -
trunk/LayoutTests/http/tests/misc/embed-image-load-outlives-gc-without-crashing.html
r145090 r273819 20 20 This has an embed element representing an image. That embed element is wrapped in a div. It removes the div, forces garbage collection, and makes sure that the window load event does not fire. It also makes sure there is no crash.<br> 21 21 <div id="thediv"> 22 <embed type="image/gif" src="resources/slowimage.p hp">22 <embed type="image/gif" src="resources/slowimage.py"> 23 23 </embed> 24 24 </div> -
trunk/LayoutTests/http/tests/misc/empty-file-formdata.html
r145160 r273819 16 16 </head> 17 17 <body> 18 <form enctype="multipart/form-data" method="POST" action="resources/check-unnamed-file-included-in-formdata.p hp">18 <form enctype="multipart/form-data" method="POST" action="resources/check-unnamed-file-included-in-formdata.py"> 19 19 <input name="data" type="file"></input> 20 20 </form> -
trunk/LayoutTests/http/tests/misc/form-blob-challenge.html
r218517 r273819 16 16 } 17 17 }; 18 xhr.open("POST", "resources/basic-echo-post.p hp", true, "testuser", "testpassword");18 xhr.open("POST", "resources/basic-echo-post.py", true, "testuser", "testpassword"); 19 19 xhr.send(formData); 20 20 </script> -
trunk/LayoutTests/http/tests/misc/form-post-textplain-cross-site.html
r237639 r273819 9 9 </p> 10 10 11 <form enctype="text/plain" method="post" action="http://localhost:8000/misc/resources/form-post-textplain.p hp" name="f">11 <form enctype="text/plain" method="post" action="http://localhost:8000/misc/resources/form-post-textplain.py" name="f"> 12 12 <input type="hidden" name="f1" value="This is field #1 &!@$% ='<>"> 13 13 <input type="hidden" name="f2" value='This is field #2 ""'> -
trunk/LayoutTests/http/tests/misc/form-post-textplain.html
r132758 r273819 10 10 </p> 11 11 12 <form enctype="text/plain" method="post" action="resources/form-post-textplain.p hp" name="f">12 <form enctype="text/plain" method="post" action="resources/form-post-textplain.py" name="f"> 13 13 <input type="hidden" name="f1" value="This is field #1 &!@$% ='<>"> 14 14 <input type="hidden" name="f2" value='This is field #2 ""'> -
trunk/LayoutTests/http/tests/misc/form-submit-file-cross-site-redirect.html
r272981 r273819 35 35 </head> 36 36 <body> 37 <form enctype="multipart/form-data" method="POST" action="/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000%2Fmisc%2Fresources%2Fcheck-test-file.p hp">37 <form enctype="multipart/form-data" method="POST" action="/resources/redirect.py?code=307&url=http%3A%2F%2Flocalhost%3A8000%2Fmisc%2Fresources%2Fcheck-test-file.py"> 38 38 <input name="data" type="file"></input> 39 39 </form> -
trunk/LayoutTests/http/tests/misc/form-submit-file-cross-site.html
r237683 r273819 35 35 </head> 36 36 <body> 37 <form enctype="multipart/form-data" method="POST" action="http://localhost:8000/misc/resources/check-test-file.p hp">37 <form enctype="multipart/form-data" method="POST" action="http://localhost:8000/misc/resources/check-test-file.py"> 38 38 <input name="data" type="file"></input> 39 39 </form> -
trunk/LayoutTests/http/tests/misc/image-checks-for-accept.html
r120167 r273819 24 24 Tests that a subresource is loaded if the server expects an Accept 25 25 header to provide it.<br> 26 <img id="testImage" src="resources/image-checks-for-accept.p hp" onload="test()" onerror="test()"/>26 <img id="testImage" src="resources/image-checks-for-accept.py" onload="test()" onerror="test()"/> 27 27 <div id="result"/> 28 28 </body> -
trunk/LayoutTests/http/tests/misc/image-error.html
r120167 r273819 15 15 This test is making sure that even though the image returns a 404, it still gets loaded and displayed. This is done for legacy compat reasons, 16 16 and is the opposite of how the object element behaves.<br> 17 <img id="result" src="resources/404image.p hp" onload="finished()" onerror="finished()">17 <img id="result" src="resources/404image.py" onload="finished()" onerror="finished()"> 18 18 </div> 19 19 <div id="console"></div> -
trunk/LayoutTests/http/tests/misc/image-input-type-outlives-gc-without-crashing.html
r145090 r273819 21 21 <div id="thediv"> 22 22 <form> 23 <input type="image" src="resources/slowimage.p hp">23 <input type="image" src="resources/slowimage.py"> 24 24 </form> 25 25 </div> -
trunk/LayoutTests/http/tests/misc/image-load-outlives-gc-without-crashing.html
r145090 r273819 20 20 This test has an image inside a div. It removes the div, forces garbage collection, and makes sure that the window load event does not fire. It also makes sure there is no crash.<br> 21 21 <div id="thediv"> 22 <img src="resources/slowimage.p hp">22 <img src="resources/slowimage.py"> 23 23 </div> 24 24 </body> -
trunk/LayoutTests/http/tests/misc/javascript-url-stop-loaders.html
r145090 r273819 4 4 <script src="/js-test-resources/js-test-pre.js"></script> 5 5 <script type="text/javascript"> 6 var str = "<script type='text/javascript' src='http://127.0.0.1:8000/misc/resources/hang-connection.p hp'><" + "/script>";6 var str = "<script type='text/javascript' src='http://127.0.0.1:8000/misc/resources/hang-connection.py'><" + "/script>"; 7 7 8 8 function loadFirst() -
trunk/LayoutTests/http/tests/misc/mask-image-accept.html
r186180 r273819 2 2 <head> 3 3 <style> 4 #test { -webkit-mask-image: url(resources/image-checks-for-accept.p hp); width:100px; height:100px; background-color: green;}4 #test { -webkit-mask-image: url(resources/image-checks-for-accept.py); width:100px; height:100px; background-color: green;} 5 5 </style> 6 6 </head> -
trunk/LayoutTests/http/tests/misc/object-image-error.html
r120167 r273819 17 17 </p> 18 18 <div id="target" style="display: none;"> 19 <object type="image/jpeg" data="resources/404image.p hp" onerror="finished()">19 <object type="image/jpeg" data="resources/404image.py" onerror="finished()"> 20 20 PASS, no crash. 21 21 </object> 22 22 </div> 23 <object type="image/jpeg" data="resources/404image.p hp" onerror="document.getElementById('target').style.display = ''"></object>23 <object type="image/jpeg" data="resources/404image.py" onerror="document.getElementById('target').style.display = ''"></object> -
trunk/LayoutTests/http/tests/misc/object-image-load-outlives-gc-without-crashing.html
r145090 r273819 20 20 This has an object element representing an image. That object element is wrapped in a div. It removes the div, forces garbage collection, and makes sure that the window load event does not fire. It also makes sure there is no crash.<br> 21 21 <div id="thediv"> 22 <object type="image/gif" data="resources/slowimage.p hp">22 <object type="image/gif" data="resources/slowimage.py"> 23 23 </object> 24 24 </div> -
trunk/LayoutTests/http/tests/misc/redirect-to-about-blank.html
r120167 r273819 23 23 </script> 24 24 <body onload="runTest()"> 25 <iframe id="theFrame" src="resources/redirect-to-about-blank.p hp"></iframe>25 <iframe id="theFrame" src="resources/redirect-to-about-blank.py"></iframe> 26 26 <div>This tests that loading a main resource that redirects to about:blank does not cause a crash (and that the load is done correctly). 27 27 <div id="result"></div> -
trunk/LayoutTests/http/tests/misc/redirect-to-external-url-expected.txt
r231450 r273819 1 Policy delegate: attempt to load http://127.0.0.1:8000/misc/resources/redirect-to-external-url.p hpwith navigation type 'link clicked' originating from HTML > #document1 Policy delegate: attempt to load http://127.0.0.1:8000/misc/resources/redirect-to-external-url.py with navigation type 'link clicked' originating from HTML > #document 2 2 Policy delegate: attempt to load spaceballs://the-flamethrower/ with navigation type 'link clicked' originating from HTML > #document 3 3 Policy delegate: unable to implement policy with error domain 'WebKitErrorDomain', error code 101, in frame '<!--frame1-->' -
trunk/LayoutTests/http/tests/misc/referrer.html
r120167 r273819 5 5 } 6 6 7 window.location = 'resources/referrer-result.p hp';7 window.location = 'resources/referrer-result.py'; 8 8 </script> -
trunk/LayoutTests/http/tests/misc/resources/SVGFont-delayed-loader.svg
r40278 r273819 10 10 <font-face font-family="name"> 11 11 <font-face-src> 12 <font-face-uri xlink:href="http://127.0.0.1:8000/misc/resources/hang-connection.p hp"/>12 <font-face-uri xlink:href="http://127.0.0.1:8000/misc/resources/hang-connection.py"/> 13 13 </font-face-src> 14 14 </font-face> -
trunk/LayoutTests/http/tests/misc/resources/nested-iframe-loading-another-iframe.html
r113091 r273819 7 7 <p>Load another level of nested iframe.</p> 8 8 </div> 9 <iframe src="3rd-level-iframe-with-blocking-resource.p hp"></iframe>9 <iframe src="3rd-level-iframe-with-blocking-resource.py"></iframe> 10 10 </body> 11 11 </html> -
trunk/LayoutTests/http/tests/misc/resources/redirect-to-external-url-iframe.html
r124692 r273819 22 22 This is a page with a link in it. When the link it clicked it will navigate to another page. That page redirects to an externally handled URL.<br> 23 23 The policy delegate should be asked about the initial navigation and the redirect.<br> 24 <a id="testlink" href="redirect-to-external-url.p hp">The kids love this one</a>24 <a id="testlink" href="redirect-to-external-url.py">The kids love this one</a> 25 25 </body> 26 26 </html> -
trunk/LayoutTests/http/tests/misc/resources/send-async-xhr.html
r69643 r273819 1 1 <script> 2 2 var req = new XMLHttpRequest(); 3 req.open("GET", "hang-connection.p hp", true);3 req.open("GET", "hang-connection.py", true); 4 4 req.onload = parent.requestLoaded; 5 5 req.send(null); -
trunk/LayoutTests/http/tests/misc/script-500.html
r124692 r273819 7 7 testRunner.dumpAsText(); 8 8 </script> 9 <script onerror="document.getElementById('result').innerHTML = 'PASS';" src="resources/script-500.p hp" type="text/javascript"></script>9 <script onerror="document.getElementById('result').innerHTML = 'PASS';" src="resources/script-500.py" type="text/javascript"></script> 10 10 </body> 11 11 </html> -
trunk/LayoutTests/http/tests/misc/script-no-store.html
r124692 r273819 11 11 { 12 12 var script = document.createElement("script"); 13 script.setAttribute("src", "resources/random-no-store.p hp");13 script.setAttribute("src", "resources/random-no-store.py"); 14 14 document.body.appendChild(script); 15 15 } -
trunk/LayoutTests/http/tests/misc/submit-post-keygen.html
r268400 r273819 13 13 </head> 14 14 <body onload="clickf()"> 15 <form name="f" action="resources/check-keygen-post.p hp" method="post">15 <form name="f" action="resources/check-keygen-post.py" method="post"> 16 16 <keygen name="spkac" keytype="RSA" /> 17 17 </form> -
trunk/LayoutTests/http/tests/misc/svg-image-load-outlives-gc-without-crashing.html
r145090 r273819 21 21 <div id="thediv"> 22 22 <svg> 23 <image xlink:href="resources/slowimage.p hp" />23 <image xlink:href="resources/slowimage.py" /> 24 24 </svg> 25 25 </div> -
trunk/LayoutTests/http/tests/misc/timer-vs-loading.html
r124692 r273819 29 29 <script> 30 30 window.setTimeout("updateClock()", 100); 31 setTimeout('window.location = "resources/hang-connection.p hp"', 0);31 setTimeout('window.location = "resources/hang-connection.py"', 0); 32 32 </script> 33 33 -
trunk/LayoutTests/http/tests/misc/url-in-utf16be.html
r124707 r273819 24 24 </head> 25 25 <body onload="runTest()"> 26 <iframe style="display: none;" id="theFrame" src="resources/echo-query-param.p hp?q=™十"></iframe>26 <iframe style="display: none;" id="theFrame" src="resources/echo-query-param.py?q=™十"></iframe> 27 27 <div>This test is for <a href="https://bugs.webkit.org/show_bug.cgi?id=21635">bug 21635</a>. The query parameter in non-UTF-8 Unicode pages (UTF-7,16,32) 28 28 should be converted to UTF-8 before a request is made to a server. -
trunk/LayoutTests/http/tests/misc/url-in-utf16le.html
r124707 r273819 24 24 </head> 25 25 <body onload="runTest()"> 26 <iframe style="display: none;" id="theFrame" src="resources/echo-query-param.p hp?q=™十"></iframe>26 <iframe style="display: none;" id="theFrame" src="resources/echo-query-param.py?q=™十"></iframe> 27 27 <div>This test is for <a href="https://bugs.webkit.org/show_bug.cgi?id=21635">bug 21635</a>. The query parameter in non-UTF-8 Unicode pages (UTF-7,16,32) 28 28 should be converted to UTF-8 before a request is made to a server. -
trunk/LayoutTests/http/tests/misc/video-poster-image-load-outlives-gc-without-crashing.html
r145090 r273819 20 20 This has a video element with an image for its poster frame. That video element is wrapped in a div. It removes the div, forces garbage collection, and makes sure that the window load event does not fire. It also makes sure there is no crash.<br> 21 21 <div id="thediv"> 22 <video poster="resources/slowimage.p hp">22 <video poster="resources/slowimage.py"> 23 23 </video> 24 24 </div> -
trunk/LayoutTests/http/tests/misc/webtiming-cross-origin-and-back1.html
r203941 r273819 6 6 testRunner.waitUntilDone(); 7 7 function doRedirect() { 8 window.location = "http://127.0.0.1:8000/misc/resources/webtiming-cross-origin-and-back-redirect1.p hp";8 window.location = "http://127.0.0.1:8000/misc/resources/webtiming-cross-origin-and-back-redirect1.py"; 9 9 } 10 10 addEventListener("load", function() { -
trunk/LayoutTests/http/tests/xmlhttprequest/on-network-timeout-error-during-preflight.html
r206524 r273819 12 12 test.step(function() { 13 13 var client = new XMLHttpRequest() 14 var url = "http://localhost:8000/misc/resources/delayed-log.p hp?delay=10000000"14 var url = "http://localhost:8000/misc/resources/delayed-log.py?delay=10000000" 15 15 client.open("GET", url, true) 16 16 client.setRequestHeader("X-Custom", "test") -
trunk/LayoutTests/http/tests/xmlhttprequest/resetting-timeout-to-zero.html
r208101 r273819 13 13 var xhr = new XMLHttpRequest(); 14 14 var startTime = new Date(); 15 xhr.open('GET', "/misc/resources/delayed-log.p hp?delay=10000000", true);15 xhr.open('GET', "/misc/resources/delayed-log.py?delay=10000000", true); 16 16 17 17 xhr.timeout = 70000; // time in milliseconds -
trunk/LayoutTests/http/tests/xmlhttprequest/timeout-greater-than-default-network-timeout.html
r208101 r273819 13 13 var xhr = new XMLHttpRequest(); 14 14 var startTime = new Date(); 15 xhr.open('GET', "/misc/resources/delayed-log.p hp?delay=10000000", true);15 xhr.open('GET', "/misc/resources/delayed-log.py?delay=10000000", true); 16 16 17 17 xhr.timeout = 70000; -
trunk/LayoutTests/platform/gtk/TestExpectations
r273811 r273819 1633 1633 webkit.org/b/186781 inspector/view/asynchronous-layout.html [ Timeout Pass ] 1634 1634 1635 Bug(GTK) http/tests/misc/large-js-program.p hp[ Pass Slow ]1635 Bug(GTK) http/tests/misc/large-js-program.py [ Pass Slow ] 1636 1636 1637 1637 [ Debug ] editing/selection/move-by-character-brute-force.html [ Pass Timeout ] -
trunk/LayoutTests/platform/ios/TestExpectations
r273812 r273819 2237 2237 webkit.org/b/152140 fast/picture/viewport-resize.html [ Skip ] 2238 2238 2239 webkit.org/b/152279 http/tests/misc/large-js-program.p hp[ Skip ]2239 webkit.org/b/152279 http/tests/misc/large-js-program.py [ Skip ] 2240 2240 webkit.org/b/152279 js/dom/line-column-numbers.html [ Skip ] 2241 2241 -
trunk/LayoutTests/platform/mac/TestExpectations
r273691 r273819 1539 1539 webkit.org/b/170877 [ Debug ] webgl/1.0.3/conformance/glsl/misc/shader-with-reserved-words.html [ Pass Timeout ] 1540 1540 1541 webkit.org/b/190724 [ Debug ] http/tests/misc/large-js-program.p hp[ Pass Timeout ]1541 webkit.org/b/190724 [ Debug ] http/tests/misc/large-js-program.py [ Pass Timeout ] 1542 1542 1543 1543 webkit.org/b/191565 imported/w3c/web-platform-tests/css/mediaqueries/test_media_queries.html [ Pass Slow ] -
trunk/LayoutTests/platform/win/TestExpectations
r273715 r273819 399 399 webkit.org/b/42435 fast/performance/ [ Skip ] 400 400 webkit.org/b/42435 http/tests/misc/webtiming-cross-origin-and-back1.html [ Skip ] 401 webkit.org/b/42435 http/tests/misc/webtiming-cross-origin-redirect.p hp[ Skip ]401 webkit.org/b/42435 http/tests/misc/webtiming-cross-origin-redirect.py [ Skip ] 402 402 webkit.org/b/42435 http/tests/misc/webtiming-no-origin.html [ Skip ] 403 403 webkit.org/b/42435 http/tests/misc/webtiming-one-redirect.php [ Skip ] … … 2992 2992 2993 2993 # <rdar://problem/21816197> large-js-program.php crashes (crashes slower on Debug) 2994 http/tests/misc/large-js-program.p hp[ Crash Timeout ]2994 http/tests/misc/large-js-program.py [ Crash Timeout ] 2995 2995 2996 2996 # Slider thumb widget painting -
trunk/LayoutTests/platform/win/http/tests/loading/basic-auth-load-URL-with-consecutive-slashes-expected.txt
r272707 r273819 3 3 frame "<!--frame1-->" - didStartProvisionalLoadForFrame 4 4 main frame - didFinishDocumentLoadForFrame 5 http://127.0.0.1:8000/loading/resources/basic-auth-testing.p hp?username=webkit&password=rocks - didReceiveAuthenticationChallenge - Responding with webkit:rocks5 http://127.0.0.1:8000/loading/resources/basic-auth-testing.py?username=webkit&password=rocks - didReceiveAuthenticationChallenge - Responding with webkit:rocks 6 6 frame "<!--frame1-->" - didCommitLoadForFrame 7 7 frame "<!--frame1-->" - didFinishDocumentLoadForFrame -
trunk/LayoutTests/platform/wk2/http/tests/misc/authentication-redirect-1/authentication-sent-to-redirect-cross-origin-expected.txt
r234912 r273819 2 2 https://bugs.webkit.org/show_bug.cgi?id=40138 3 3 You should load this page at 127.0.0.1:8000 so localhost:8000 is considered a different security origin. 4 This test loads a p hpscript which demands http authentication, then uses it to redirect to another script in a different origin that shows what authentication headers were sent with the final request.4 This test loads a py script which demands http authentication, then uses it to redirect to another script in a different origin that shows what authentication headers were sent with the final request. 5 5 It does this once each for HTTP 301, 302, 303, and 307 redirects. 6 6 If not running under DRT, enter any credentials when asked. -
trunk/LayoutTests/platform/wk2/http/tests/misc/authentication-redirect-2/authentication-sent-to-redirect-same-origin-expected.txt
r234912 r273819 2 2 https://bugs.webkit.org/show_bug.cgi?id=66354 3 3 You should load this page at 127.0.0.1:8000 because the test relies on redirects within the 127.0.0.1:8000 security origin. 4 This test loads a p hpscript which demands http authentication, then uses it to redirect to another script in the same origin that shows what authentication headers were sent with the final request.4 This test loads a py script which demands http authentication, then uses it to redirect to another script in the same origin that shows what authentication headers were sent with the final request. 5 5 It does this once each for HTTP 301, 302, 303, and 307 redirects. 6 6 If not running under DRT, enter any credentials when asked. -
trunk/LayoutTests/platform/wk2/http/tests/misc/authentication-redirect-3/authentication-sent-to-redirect-same-origin-with-location-credentials-expected.txt
r234912 r273819 2 2 https://bugs.webkit.org/show_bug.cgi?id=66354 3 3 You should load this page at 127.0.0.1:8000 because the test relies on redirects within the 127.0.0.1:8000 security origin. 4 This test loads a p hpscript which demands http authentication, then uses it to redirect to another script in the same origin that shows what authentication headers were sent with the final request.4 This test loads a py script which demands http authentication, then uses it to redirect to another script in the same origin that shows what authentication headers were sent with the final request. 5 5 The redirect includes credentials in the location url, and they should be preferred over credentials that WebCore has cached. 6 6 It does this once each for HTTP 301, 302, 303, and 307 redirects. -
trunk/LayoutTests/platform/wk2/http/tests/misc/authentication-redirect-4/authentication-sent-to-redirect-same-origin-url-expected.txt
r234912 r273819 2 2 https://bugs.webkit.org/show_bug.cgi?id=105190 3 3 You should load this page at 127.0.0.1:8000 because the test relies on redirects within the 127.0.0.1:8000 security origin. 4 This test loads a p hpscript which demands http authentication, then uses it to redirect via 301 to another script in the same origin that shows what authentication headers were sent with the final request. It verifies that the credentials are not placed in the final URL.4 This test loads a py script which demands http authentication, then uses it to redirect via 301 to another script in the same origin that shows what authentication headers were sent with the final request. It verifies that the credentials are not placed in the final URL. 5 5 If not running under DRT, enter any credentials when asked. 6 6 … … 9 9 Frame: '<!--frame1-->' 10 10 -------- 11 http://127.0.0.1:8000/misc/authentication-redirect-4/resources/auth-echo.p hploaded with HTTP authentication username 'testUser' and password 'testPassword'11 http://127.0.0.1:8000/misc/authentication-redirect-4/resources/auth-echo.py loaded with HTTP authentication username 'testUser' and password 'testPassword'
Note: See TracChangeset
for help on using the changeset viewer.