Title: [182893] trunk/LayoutTests
Revision
182893
Author
a...@apple.com
Date
2015-04-16 10:30:20 -0700 (Thu, 16 Apr 2015)

Log Message

More flaky tests in http/tests/security/mixedContent
https://bugs.webkit.org/show_bug.cgi?id=143804

Reviewed by Csaba Osztrogonác.

Start secondary window loading in onload, so that it doesn't race with main document
finishing to load.

* http/tests/security/mixedContent/about-blank-iframe-in-main-frame-expected.txt:
* http/tests/security/mixedContent/about-blank-iframe-in-main-frame.html:
* http/tests/security/mixedContent/insecure-audio-video-in-main-frame.html:
* http/tests/security/mixedContent/insecure-iframe-in-main-frame-expected.txt:
* http/tests/security/mixedContent/insecure-iframe-in-main-frame.html:
* http/tests/security/mixedContent/insecure-image-in-main-frame.html:
* http/tests/security/mixedContent/insecure-xhr-in-main-frame.html:
* http/tests/security/mixedContent/redirect-http-to-https-iframe-in-main-frame-expected.txt:
* http/tests/security/mixedContent/redirect-http-to-https-iframe-in-main-frame.html:
* http/tests/security/mixedContent/redirect-https-to-http-iframe-in-main-frame-expected.txt:
* http/tests/security/mixedContent/redirect-https-to-http-iframe-in-main-frame.html:

Modified Paths

Diff

Modified: trunk/LayoutTests/ChangeLog (182892 => 182893)


--- trunk/LayoutTests/ChangeLog	2015-04-16 17:28:34 UTC (rev 182892)
+++ trunk/LayoutTests/ChangeLog	2015-04-16 17:30:20 UTC (rev 182893)
@@ -1,3 +1,25 @@
+2015-04-16  Alexey Proskuryakov  <a...@apple.com>
+
+        More flaky tests in http/tests/security/mixedContent
+        https://bugs.webkit.org/show_bug.cgi?id=143804
+
+        Reviewed by Csaba Osztrogonác.
+
+        Start secondary window loading in onload, so that it doesn't race with main document
+        finishing to load.
+
+        * http/tests/security/mixedContent/about-blank-iframe-in-main-frame-expected.txt:
+        * http/tests/security/mixedContent/about-blank-iframe-in-main-frame.html:
+        * http/tests/security/mixedContent/insecure-audio-video-in-main-frame.html:
+        * http/tests/security/mixedContent/insecure-iframe-in-main-frame-expected.txt:
+        * http/tests/security/mixedContent/insecure-iframe-in-main-frame.html:
+        * http/tests/security/mixedContent/insecure-image-in-main-frame.html:
+        * http/tests/security/mixedContent/insecure-xhr-in-main-frame.html:
+        * http/tests/security/mixedContent/redirect-http-to-https-iframe-in-main-frame-expected.txt:
+        * http/tests/security/mixedContent/redirect-http-to-https-iframe-in-main-frame.html:
+        * http/tests/security/mixedContent/redirect-https-to-http-iframe-in-main-frame-expected.txt:
+        * http/tests/security/mixedContent/redirect-https-to-http-iframe-in-main-frame.html:
+
 2015-04-15  Chris Dumez  <cdu...@apple.com>
 
         Add a console message when a stylesheet is not parsed due to invalid MIME type

Modified: trunk/LayoutTests/http/tests/security/mixedContent/about-blank-iframe-in-main-frame-expected.txt (182892 => 182893)


--- trunk/LayoutTests/http/tests/security/mixedContent/about-blank-iframe-in-main-frame-expected.txt	2015-04-16 17:28:34 UTC (rev 182892)
+++ trunk/LayoutTests/http/tests/security/mixedContent/about-blank-iframe-in-main-frame-expected.txt	2015-04-16 17:30:20 UTC (rev 182893)
@@ -1,5 +1,5 @@
+main frame - didFinishDocumentLoadForFrame
 main frame - didStartProvisionalLoadForFrame
-main frame - didFinishDocumentLoadForFrame
 main frame - didHandleOnloadEventsForFrame
 main frame - didFinishLoadForFrame
 main frame - didCommitLoadForFrame

Modified: trunk/LayoutTests/http/tests/security/mixedContent/about-blank-iframe-in-main-frame.html (182892 => 182893)


--- trunk/LayoutTests/http/tests/security/mixedContent/about-blank-iframe-in-main-frame.html	2015-04-16 17:28:34 UTC (rev 182892)
+++ trunk/LayoutTests/http/tests/security/mixedContent/about-blank-iframe-in-main-frame.html	2015-04-16 17:30:20 UTC (rev 182893)
@@ -19,7 +19,9 @@
 *not* trigger a mixed content callback because the about:blank iframes cannot
 be corrupted by active network attackers.</p>
 <script>
-window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-about-blank-frame.html");
+_onload_ = function() {
+    window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-about-blank-frame.html");
+}
 </script>
 </body>
 </html>

Modified: trunk/LayoutTests/http/tests/security/mixedContent/insecure-audio-video-in-main-frame.html (182892 => 182893)


--- trunk/LayoutTests/http/tests/security/mixedContent/insecure-audio-video-in-main-frame.html	2015-04-16 17:28:34 UTC (rev 182892)
+++ trunk/LayoutTests/http/tests/security/mixedContent/insecure-audio-video-in-main-frame.html	2015-04-16 17:30:20 UTC (rev 182893)
@@ -18,7 +18,9 @@
 trigger a mixed content callback because the main frame in the window is HTTPS but is
 displaying insecure content.</p>
 <script>
-window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-audio-video.html");
+_onload_ = function() {
+    window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-audio-video.html");
+}
 </script>
 </body>
 </html>

Modified: trunk/LayoutTests/http/tests/security/mixedContent/insecure-iframe-in-main-frame-expected.txt (182892 => 182893)


--- trunk/LayoutTests/http/tests/security/mixedContent/insecure-iframe-in-main-frame-expected.txt	2015-04-16 17:28:34 UTC (rev 182892)
+++ trunk/LayoutTests/http/tests/security/mixedContent/insecure-iframe-in-main-frame-expected.txt	2015-04-16 17:30:20 UTC (rev 182893)
@@ -1,5 +1,5 @@
+main frame - didFinishDocumentLoadForFrame
 main frame - didStartProvisionalLoadForFrame
-main frame - didFinishDocumentLoadForFrame
 main frame - didHandleOnloadEventsForFrame
 main frame - didFinishLoadForFrame
 main frame - didCommitLoadForFrame

Modified: trunk/LayoutTests/http/tests/security/mixedContent/insecure-iframe-in-main-frame.html (182892 => 182893)


--- trunk/LayoutTests/http/tests/security/mixedContent/insecure-iframe-in-main-frame.html	2015-04-16 17:28:34 UTC (rev 182892)
+++ trunk/LayoutTests/http/tests/security/mixedContent/insecure-iframe-in-main-frame.html	2015-04-16 17:30:20 UTC (rev 182893)
@@ -19,7 +19,9 @@
 mixed content callback because the main frame in the window is HTTPS but is
 displaying insecure content.</p>
 <script>
-window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-frame.html");
+_onload_ = function() {
+    window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-frame.html");
+}
 </script>
 </body>
 </html>

Modified: trunk/LayoutTests/http/tests/security/mixedContent/insecure-image-in-main-frame.html (182892 => 182893)


--- trunk/LayoutTests/http/tests/security/mixedContent/insecure-image-in-main-frame.html	2015-04-16 17:28:34 UTC (rev 182892)
+++ trunk/LayoutTests/http/tests/security/mixedContent/insecure-image-in-main-frame.html	2015-04-16 17:30:20 UTC (rev 182893)
@@ -18,7 +18,9 @@
 mixed content callback because the main frame in the window is HTTPS but is
 displaying insecure content.</p>
 <script>
-window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-image.html");
+_onload_ = function() {
+    window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-image.html");
+}
 </script>
 </body>
 </html>

Modified: trunk/LayoutTests/http/tests/security/mixedContent/insecure-xhr-in-main-frame.html (182892 => 182893)


--- trunk/LayoutTests/http/tests/security/mixedContent/insecure-xhr-in-main-frame.html	2015-04-16 17:28:34 UTC (rev 182892)
+++ trunk/LayoutTests/http/tests/security/mixedContent/insecure-xhr-in-main-frame.html	2015-04-16 17:30:20 UTC (rev 182893)
@@ -20,7 +20,9 @@
 trigger a mixed content callback because the main frame in the window is HTTPS but
 now has insecure data.</p>
 <script>
-window.open("https://127.0.0.1:8443/xmlhttprequest/access-control-response-with-body.html");
+_onload_ = function() {
+    window.open("https://127.0.0.1:8443/xmlhttprequest/access-control-response-with-body.html");
+}
 </script>
 </body>
 </html>

Modified: trunk/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-iframe-in-main-frame-expected.txt (182892 => 182893)


--- trunk/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-iframe-in-main-frame-expected.txt	2015-04-16 17:28:34 UTC (rev 182892)
+++ trunk/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-iframe-in-main-frame-expected.txt	2015-04-16 17:30:20 UTC (rev 182893)
@@ -1,5 +1,5 @@
+main frame - didFinishDocumentLoadForFrame
 main frame - didStartProvisionalLoadForFrame
-main frame - didFinishDocumentLoadForFrame
 main frame - didHandleOnloadEventsForFrame
 main frame - didFinishLoadForFrame
 main frame - didCommitLoadForFrame

Modified: trunk/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-iframe-in-main-frame.html (182892 => 182893)


--- trunk/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-iframe-in-main-frame.html	2015-04-16 17:28:34 UTC (rev 182892)
+++ trunk/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-iframe-in-main-frame.html	2015-04-16 17:30:20 UTC (rev 182893)
@@ -22,7 +22,9 @@
 in the window is HTTPS but is displaying content that can be controlled by an
 active network attacker.</p>
 <script>
-window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-redirect-http-to-https-frame.html");
+_onload_ = function() {
+    window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-redirect-http-to-https-frame.html");
+}
 </script>
 </body>
 </html>

Modified: trunk/LayoutTests/http/tests/security/mixedContent/redirect-https-to-http-iframe-in-main-frame-expected.txt (182892 => 182893)


--- trunk/LayoutTests/http/tests/security/mixedContent/redirect-https-to-http-iframe-in-main-frame-expected.txt	2015-04-16 17:28:34 UTC (rev 182892)
+++ trunk/LayoutTests/http/tests/security/mixedContent/redirect-https-to-http-iframe-in-main-frame-expected.txt	2015-04-16 17:30:20 UTC (rev 182893)
@@ -1,5 +1,5 @@
+main frame - didFinishDocumentLoadForFrame
 main frame - didStartProvisionalLoadForFrame
-main frame - didFinishDocumentLoadForFrame
 main frame - didHandleOnloadEventsForFrame
 main frame - didFinishLoadForFrame
 main frame - didCommitLoadForFrame

Modified: trunk/LayoutTests/http/tests/security/mixedContent/redirect-https-to-http-iframe-in-main-frame.html (182892 => 182893)


--- trunk/LayoutTests/http/tests/security/mixedContent/redirect-https-to-http-iframe-in-main-frame.html	2015-04-16 17:28:34 UTC (rev 182892)
+++ trunk/LayoutTests/http/tests/security/mixedContent/redirect-https-to-http-iframe-in-main-frame.html	2015-04-16 17:30:20 UTC (rev 182893)
@@ -22,7 +22,9 @@
 in the window is HTTPS but is displaying content that can be controlled by an
 active network attacker.</p>
 <script>
-window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-redirect-https-to-http-frame.html");
+_onload_ = function() {
+    window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-redirect-https-to-http-frame.html");
+}
 </script>
 
 </body>
_______________________________________________
webkit-changes mailing list
webkit-changes@lists.webkit.org
https://lists.webkit.org/mailman/listinfo/webkit-changes

Reply via email to