Title: [231597] trunk
Revision
231597
Author
[email protected]
Date
2018-05-09 14:48:38 -0700 (Wed, 09 May 2018)

Log Message

REGRESSION (r231479): http/tests/appcache/x-frame-options-prevents-framing.php is timing out
https://bugs.webkit.org/show_bug.cgi?id=185443
<rdar://problem/40100660>

Reviewed by Andy Estes.

Source/WebCore:

Following r231479 when using WebKit2 and Restricted HTTP Response Access is enabled (enabled in
WebKitTestRunner) we only check the CSP frame-ancestors directive and X-Frame-Options in
NetworkProcess. We need to check these security requirements in WebContent process whenever
we are performing a substitute data load, such as for app cache, as these loads do not go
through NetworkProcess.

* loader/DocumentLoader.cpp:
(WebCore::DocumentLoader::responseReceived):

LayoutTests:

Unskip test now that it no longer times out.

* platform/wk2/TestExpectations:

Modified Paths

Diff

Modified: trunk/LayoutTests/ChangeLog (231596 => 231597)


--- trunk/LayoutTests/ChangeLog	2018-05-09 21:30:18 UTC (rev 231596)
+++ trunk/LayoutTests/ChangeLog	2018-05-09 21:48:38 UTC (rev 231597)
@@ -1,3 +1,15 @@
+2018-05-09  Daniel Bates  <[email protected]>
+
+        REGRESSION (r231479): http/tests/appcache/x-frame-options-prevents-framing.php is timing out
+        https://bugs.webkit.org/show_bug.cgi?id=185443
+        <rdar://problem/40100660>
+
+        Reviewed by Andy Estes.
+
+        Unskip test now that it no longer times out.
+
+        * platform/wk2/TestExpectations:
+
 2018-05-09  Justin Fan  <[email protected]>
 
         Added Khronos conformance test for ASTC compressed texture support.

Modified: trunk/LayoutTests/platform/wk2/TestExpectations (231596 => 231597)


--- trunk/LayoutTests/platform/wk2/TestExpectations	2018-05-09 21:30:18 UTC (rev 231596)
+++ trunk/LayoutTests/platform/wk2/TestExpectations	2018-05-09 21:48:38 UTC (rev 231597)
@@ -45,8 +45,6 @@
 webkit.org/b/156612 http/tests/security/contentSecurityPolicy/embed-redirect-blocked3.html [ Failure ]
 webkit.org/b/156612 http/tests/security/contentSecurityPolicy/object-redirect-blocked3.html [ Failure ]
 
-webkit.org/b/185443 http/tests/appcache/x-frame-options-prevents-framing.php [ Skip ]
-
 # AX tests that require hit testing do not work in WK2.
 webkit.org/b/71298 accessibility/loading-iframe-updates-axtree.html
 

Modified: trunk/Source/WebCore/ChangeLog (231596 => 231597)


--- trunk/Source/WebCore/ChangeLog	2018-05-09 21:30:18 UTC (rev 231596)
+++ trunk/Source/WebCore/ChangeLog	2018-05-09 21:48:38 UTC (rev 231597)
@@ -1,3 +1,20 @@
+2018-05-09  Daniel Bates  <[email protected]>
+
+        REGRESSION (r231479): http/tests/appcache/x-frame-options-prevents-framing.php is timing out
+        https://bugs.webkit.org/show_bug.cgi?id=185443
+        <rdar://problem/40100660>
+
+        Reviewed by Andy Estes.
+
+        Following r231479 when using WebKit2 and Restricted HTTP Response Access is enabled (enabled in
+        WebKitTestRunner) we only check the CSP frame-ancestors directive and X-Frame-Options in
+        NetworkProcess. We need to check these security requirements in WebContent process whenever
+        we are performing a substitute data load, such as for app cache, as these loads do not go
+        through NetworkProcess.
+
+        * loader/DocumentLoader.cpp:
+        (WebCore::DocumentLoader::responseReceived):
+
 2018-05-09  Justin Fan  <[email protected]>
 
         Hooked up ASTC support in WebGL; requires OpenGL ES 3 context to work. 

Modified: trunk/Source/WebCore/loader/DocumentLoader.cpp (231596 => 231597)


--- trunk/Source/WebCore/loader/DocumentLoader.cpp	2018-05-09 21:30:18 UTC (rev 231596)
+++ trunk/Source/WebCore/loader/DocumentLoader.cpp	2018-05-09 21:48:38 UTC (rev 231597)
@@ -768,7 +768,7 @@
     unsigned long identifier = m_identifierForLoadWithoutResourceLoader ? m_identifierForLoadWithoutResourceLoader : m_mainResource->identifier();
     ASSERT(identifier);
 
-    if (!m_frame->settings().networkProcessCSPFrameAncestorsCheckingEnabled() || !RuntimeEnabledFeatures::sharedFeatures().restrictedHTTPResponseAccess()) {
+    if (m_substituteData.isValid() || !m_frame->settings().networkProcessCSPFrameAncestorsCheckingEnabled() || !RuntimeEnabledFeatures::sharedFeatures().restrictedHTTPResponseAccess()) {
         auto url = ""
         ContentSecurityPolicy contentSecurityPolicy(URL { url }, this);
         contentSecurityPolicy.didReceiveHeaders(ContentSecurityPolicyResponseHeaders { response }, m_request.httpReferrer());
_______________________________________________
webkit-changes mailing list
[email protected]
https://lists.webkit.org/mailman/listinfo/webkit-changes

Reply via email to