Title: [102300] trunk
Revision
102300
Author
[email protected]
Date
2011-12-07 18:45:00 -0800 (Wed, 07 Dec 2011)

Log Message

Revert mixed content handling for video fix and follow-up test expectations & Skipped changes.
(r101883, r101918, r101927, r101981, r101986, r101997)
https://bugs.webkit.org/show_bug.cgi?id=72178

Patch by Aaron Colwell <[email protected]> on 2011-12-07
Reviewed by Adam Barth.

Source/WebCore:

* loader/SubresourceLoader.cpp:
(WebCore::SubresourceLoader::willSendRequest):
* loader/cache/CachedRawResource.cpp:
* loader/cache/CachedRawResource.h:
* loader/cache/CachedResource.cpp:
(WebCore::defaultPriorityForResourceType):
(WebCore::cachedResourceTypeToTargetType):
* loader/cache/CachedResource.h:
* loader/cache/CachedResourceLoader.cpp:
(WebCore::createResource):
(WebCore::CachedResourceLoader::checkInsecureContent):
(WebCore::CachedResourceLoader::canRequest):
(WebCore::CachedResourceLoader::requestResource):

LayoutTests:

* http/tests/security/mixedContent/insecure-video-in-iframe-expected.txt: Removed.
* http/tests/security/mixedContent/insecure-video-in-iframe.html: Removed.
* http/tests/security/mixedContent/insecure-video-in-main-frame-expected.txt: Removed.
* http/tests/security/mixedContent/insecure-video-in-main-frame.html: Removed.
* http/tests/security/mixedContent/redirect-http-to-https-video-in-main-frame-expected.txt: Removed.
* http/tests/security/mixedContent/redirect-http-to-https-video-in-main-frame.html: Removed.
* http/tests/security/mixedContent/redirect-https-to-http-video-in-main-frame-expected.txt: Removed.
* http/tests/security/mixedContent/redirect-https-to-http-video-in-main-frame.html: Removed.
* http/tests/security/mixedContent/resources/frame-with-insecure-video.html: Removed.
* http/tests/security/mixedContent/resources/frame-with-redirect-http-to-https-video.html: Removed.
* http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-video.html: Removed.
* platform/chromium-cg-mac-snowleopard/http/tests/security/mixedContent/insecure-video-in-main-frame-expected.txt: Removed.
* platform/chromium-cg-mac-snowleopard/http/tests/security/mixedContent/redirect-http-to-https-video-in-main-frame-expected.txt: Removed.
* platform/chromium-mac-snowleopard/http/tests/security/mixedContent/insecure-video-in-main-frame-expected.txt: Removed.
* platform/chromium-mac-snowleopard/http/tests/security/mixedContent/redirect-http-to-https-video-in-main-frame-expected.txt: Removed.
* platform/gtk/Skipped:
* platform/qt/Skipped:

Modified Paths

Removed Paths

Diff

Modified: trunk/LayoutTests/ChangeLog (102299 => 102300)


--- trunk/LayoutTests/ChangeLog	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/LayoutTests/ChangeLog	2011-12-08 02:45:00 UTC (rev 102300)
@@ -1,3 +1,29 @@
+2011-12-07  Aaron Colwell  <[email protected]>
+
+        Revert mixed content handling for video fix and follow-up test expectations & Skipped changes.
+        (r101883, r101918, r101927, r101981, r101986, r101997)
+        https://bugs.webkit.org/show_bug.cgi?id=72178
+
+        Reviewed by Adam Barth.
+
+        * http/tests/security/mixedContent/insecure-video-in-iframe-expected.txt: Removed.
+        * http/tests/security/mixedContent/insecure-video-in-iframe.html: Removed.
+        * http/tests/security/mixedContent/insecure-video-in-main-frame-expected.txt: Removed.
+        * http/tests/security/mixedContent/insecure-video-in-main-frame.html: Removed.
+        * http/tests/security/mixedContent/redirect-http-to-https-video-in-main-frame-expected.txt: Removed.
+        * http/tests/security/mixedContent/redirect-http-to-https-video-in-main-frame.html: Removed.
+        * http/tests/security/mixedContent/redirect-https-to-http-video-in-main-frame-expected.txt: Removed.
+        * http/tests/security/mixedContent/redirect-https-to-http-video-in-main-frame.html: Removed.
+        * http/tests/security/mixedContent/resources/frame-with-insecure-video.html: Removed.
+        * http/tests/security/mixedContent/resources/frame-with-redirect-http-to-https-video.html: Removed.
+        * http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-video.html: Removed.
+        * platform/chromium-cg-mac-snowleopard/http/tests/security/mixedContent/insecure-video-in-main-frame-expected.txt: Removed.
+        * platform/chromium-cg-mac-snowleopard/http/tests/security/mixedContent/redirect-http-to-https-video-in-main-frame-expected.txt: Removed.
+        * platform/chromium-mac-snowleopard/http/tests/security/mixedContent/insecure-video-in-main-frame-expected.txt: Removed.
+        * platform/chromium-mac-snowleopard/http/tests/security/mixedContent/redirect-http-to-https-video-in-main-frame-expected.txt: Removed.
+        * platform/gtk/Skipped:
+        * platform/qt/Skipped:
+
 2011-12-07  Kent Tamura  <[email protected]>
 
         [Qt] Follow up of r102226.

Deleted: trunk/LayoutTests/http/tests/security/mixedContent/insecure-video-in-iframe-expected.txt (102299 => 102300)


--- trunk/LayoutTests/http/tests/security/mixedContent/insecure-video-in-iframe-expected.txt	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/LayoutTests/http/tests/security/mixedContent/insecure-video-in-iframe-expected.txt	2011-12-08 02:45:00 UTC (rev 102300)
@@ -1,11 +0,0 @@
-frame "<!--framePath //<!--frame0-->-->" - didStartProvisionalLoadForFrame
-main frame - didFinishDocumentLoadForFrame
-frame "<!--framePath //<!--frame0-->-->" - didCommitLoadForFrame
-frame "<!--framePath //<!--frame0-->-->" - didFinishDocumentLoadForFrame
-frame "<!--framePath //<!--frame0-->-->" - didHandleOnloadEventsForFrame
-main frame - didHandleOnloadEventsForFrame
-frame "<!--framePath //<!--frame0-->-->" - didFinishLoadForFrame
-main frame - didFinishLoadForFrame
-This test loads a secure iframe that loads an insecure video. We should *not* get a mixed content callback because the main frame is HTTP and the video doesn't contaminate the child iframe's security origin with mixed content.
-
-

Deleted: trunk/LayoutTests/http/tests/security/mixedContent/insecure-video-in-iframe.html (102299 => 102300)


--- trunk/LayoutTests/http/tests/security/mixedContent/insecure-video-in-iframe.html	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/LayoutTests/http/tests/security/mixedContent/insecure-video-in-iframe.html	2011-12-08 02:45:00 UTC (rev 102300)
@@ -1,14 +0,0 @@
-<html>
-    <body>
-        <script>
-            if (window.layoutTestController) {
-                layoutTestController.dumpAsText();
-                layoutTestController.dumpFrameLoadCallbacks();
-            }
-        </script>
-        <p>This test loads a secure iframe that loads an insecure video.  We should
-*not* get a mixed content callback because the main frame is HTTP and the video
-doesn't contaminate the child iframe's security origin with mixed content.</p>
-        <iframe src=""
-    </body>
-</html>

Deleted: trunk/LayoutTests/http/tests/security/mixedContent/insecure-video-in-main-frame-expected.txt (102299 => 102300)


--- trunk/LayoutTests/http/tests/security/mixedContent/insecure-video-in-main-frame-expected.txt	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/LayoutTests/http/tests/security/mixedContent/insecure-video-in-main-frame-expected.txt	2011-12-08 02:45:00 UTC (rev 102300)
@@ -1,12 +0,0 @@
-main frame - didStartProvisionalLoadForFrame
-main frame - didFinishDocumentLoadForFrame
-main frame - didHandleOnloadEventsForFrame
-main frame - didFinishLoadForFrame
-main frame - didCommitLoadForFrame
-main frame - didFinishDocumentLoadForFrame
-main frame - didHandleOnloadEventsForFrame
-main frame - didFinishLoadForFrame
-CONSOLE MESSAGE: line 1: The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-video.html displayed insecure content from http://127.0.0.1:8080/resources/test.ogv.
-
-didDisplayInsecureContent
-This test opens a window that loads an insecure video. We should trigger a mixed content callback because the main frame in the window is HTTPS but is displaying insecure content.

Deleted: trunk/LayoutTests/http/tests/security/mixedContent/insecure-video-in-main-frame.html (102299 => 102300)


--- trunk/LayoutTests/http/tests/security/mixedContent/insecure-video-in-main-frame.html	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/LayoutTests/http/tests/security/mixedContent/insecure-video-in-main-frame.html	2011-12-08 02:45:00 UTC (rev 102300)
@@ -1,25 +0,0 @@
-<html>
-    <body>
-        <script>
-            if (window.layoutTestController) {
-                layoutTestController.waitUntilDone();
-                layoutTestController.dumpAsText();
-                layoutTestController.dumpFrameLoadCallbacks();
-                layoutTestController.setCanOpenWindows();
-                layoutTestController.setCloseRemainingWindowsWhenComplete(true);
-            }
-
-            window.addEventListener("message", function (e) {
-                if (window.layoutTestController)
-                    layoutTestController.notifyDone();
-            }, false);
-
-        </script>
-        <p>This test opens a window that loads an insecure video.  We should trigger a
-mixed content callback because the main frame in the window is HTTPS but is
-displaying insecure content.</p>
-        <script>
-            window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-video.html");
-        </script>
-    </body>
-</html>

Deleted: trunk/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-video-in-main-frame-expected.txt (102299 => 102300)


--- trunk/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-video-in-main-frame-expected.txt	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-video-in-main-frame-expected.txt	2011-12-08 02:45:00 UTC (rev 102300)
@@ -1,12 +0,0 @@
-main frame - didStartProvisionalLoadForFrame
-main frame - didFinishDocumentLoadForFrame
-main frame - didHandleOnloadEventsForFrame
-main frame - didFinishLoadForFrame
-main frame - didCommitLoadForFrame
-main frame - didFinishDocumentLoadForFrame
-main frame - didHandleOnloadEventsForFrame
-main frame - didFinishLoadForFrame
-CONSOLE MESSAGE: line 1: The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-redirect-http-to-https-video.html displayed insecure content from http://127.0.0.1:8080/security/resources/redir.php?url=""
-
-didDisplayInsecureContent
-This test opens a window that loads an insecure video(via a tricky redirect). We should trigger a mixed content callback because the main frame in the window is HTTPS but is displaying insecure content.

Deleted: trunk/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-video-in-main-frame.html (102299 => 102300)


--- trunk/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-video-in-main-frame.html	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-video-in-main-frame.html	2011-12-08 02:45:00 UTC (rev 102300)
@@ -1,25 +0,0 @@
-<html>
-    <body>
-        <script>
-            if (window.layoutTestController) {
-                layoutTestController.waitUntilDone();
-                layoutTestController.dumpAsText();
-                layoutTestController.dumpFrameLoadCallbacks();
-                layoutTestController.setCanOpenWindows();
-                layoutTestController.setCloseRemainingWindowsWhenComplete(true);
-            }
-
-            window.addEventListener("message", function (e) {
-                if (window.layoutTestController)
-                    layoutTestController.notifyDone();
-            }, false);
-
-        </script>
-        <p>This test opens a window that loads an insecure video(via a tricky 
-redirect).  We should trigger a mixed content callback because the main frame in the window is HTTPS but is
-displaying insecure content.</p>
-        <script>
-            window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-redirect-http-to-https-video.html");
-        </script>
-    </body>
-</html>

Deleted: trunk/LayoutTests/http/tests/security/mixedContent/redirect-https-to-http-video-in-main-frame-expected.txt (102299 => 102300)


--- trunk/LayoutTests/http/tests/security/mixedContent/redirect-https-to-http-video-in-main-frame-expected.txt	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/LayoutTests/http/tests/security/mixedContent/redirect-https-to-http-video-in-main-frame-expected.txt	2011-12-08 02:45:00 UTC (rev 102300)
@@ -1,12 +0,0 @@
-main frame - didStartProvisionalLoadForFrame
-main frame - didFinishDocumentLoadForFrame
-main frame - didHandleOnloadEventsForFrame
-main frame - didFinishLoadForFrame
-main frame - didCommitLoadForFrame
-main frame - didFinishDocumentLoadForFrame
-main frame - didHandleOnloadEventsForFrame
-main frame - didFinishLoadForFrame
-CONSOLE MESSAGE: line 1: The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-redirect-https-to-http-video.html displayed insecure content from http://127.0.0.1:8080/resources/test.ogv.
-
-didDisplayInsecureContent
-This test opens a window that loads an insecure video(via a tricky redirect). We should trigger a mixed content callback because the main frame in the window is HTTPS but is displaying insecure content.

Deleted: trunk/LayoutTests/http/tests/security/mixedContent/redirect-https-to-http-video-in-main-frame.html (102299 => 102300)


--- trunk/LayoutTests/http/tests/security/mixedContent/redirect-https-to-http-video-in-main-frame.html	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/LayoutTests/http/tests/security/mixedContent/redirect-https-to-http-video-in-main-frame.html	2011-12-08 02:45:00 UTC (rev 102300)
@@ -1,25 +0,0 @@
-<html>
-    <body>
-        <script>
-            if (window.layoutTestController) {
-                layoutTestController.waitUntilDone();
-                layoutTestController.dumpAsText();
-                layoutTestController.dumpFrameLoadCallbacks();
-                layoutTestController.setCanOpenWindows();
-                layoutTestController.setCloseRemainingWindowsWhenComplete(true);
-            }
-
-            window.addEventListener("message", function (e) {
-                if (window.layoutTestController)
-                    layoutTestController.notifyDone();
-            }, false);
-
-        </script>
-        <p>This test opens a window that loads an insecure video(via a tricky 
-redirect).  We should trigger a mixed content callback because the main frame in the window is HTTPS but is
-displaying insecure content.</p>
-        <script>
-            window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-redirect-https-to-http-video.html");
-        </script>
-    </body>
-</html>

Deleted: trunk/LayoutTests/http/tests/security/mixedContent/resources/frame-with-insecure-video.html (102299 => 102300)


--- trunk/LayoutTests/http/tests/security/mixedContent/resources/frame-with-insecure-video.html	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/LayoutTests/http/tests/security/mixedContent/resources/frame-with-insecure-video.html	2011-12-08 02:45:00 UTC (rev 102300)
@@ -1,23 +0,0 @@
-<html>
-    <head>
-        <script src=""
-        <script>
-            function frameLoaded() {
-                video = document.getElementById('v');
-
-                video.addEventListener('loadedmetadata', function(e) {
-                    if (window.opener)
-                        window.opener.postMessage('done', '*');
-                 }, true);
-
-                var mediaFile = findMediaFile('video', 'resources/test');
-                video.src = '' + mediaFile;
-                video.play();
-            }
-        </script>
-    </head>
-    <body _onload_="frameLoaded()">
-        <video id="v"> </video>
-        <p>Test that at least one progress event is fired after starting to load the video.</p>
-    </body>
-</html>

Deleted: trunk/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-http-to-https-video.html (102299 => 102300)


--- trunk/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-http-to-https-video.html	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-http-to-https-video.html	2011-12-08 02:45:00 UTC (rev 102300)
@@ -1,23 +0,0 @@
-<html>
-    <head>
-        <script src=""
-        <script>
-            function frameLoaded() {
-                video = document.getElementById('v');
-
-                video.addEventListener('loadedmetadata', function(e) {
-                    if (window.opener)
-                        window.opener.postMessage('done', '*');
-                 }, true);
-
-                var mediaFile = findMediaFile('video', 'resources/test');
-                video.src = '' + mediaFile;
-                video.play();
-            }
-        </script>
-    </head>
-    <body _onload_="frameLoaded()">
-        <video id="v"> </video>
-        <p>Test that at least one progress event is fired after starting to load the video.</p>
-    </body>
-</html>

Deleted: trunk/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-video.html (102299 => 102300)


--- trunk/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-video.html	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/LayoutTests/http/tests/security/mixedContent/resources/frame-with-redirect-https-to-http-video.html	2011-12-08 02:45:00 UTC (rev 102300)
@@ -1,23 +0,0 @@
-<html>
-    <head>
-        <script src=""
-        <script>
-            function frameLoaded() {
-                video = document.getElementById('v');
-
-                video.addEventListener('loadedmetadata', function(e) {
-                    if (window.opener)
-                        window.opener.postMessage('done', '*');
-                 }, true);
-
-                var mediaFile = findMediaFile('video', 'resources/test');
-                video.src = '' + mediaFile;
-                video.play();
-            }
-        </script>
-    </head>
-    <body _onload_="frameLoaded()">
-        <video id="v"> </video>
-        <p>Test that at least one progress event is fired after starting to load the video.</p>
-    </body>
-</html>

Deleted: trunk/LayoutTests/platform/chromium-cg-mac-snowleopard/http/tests/security/mixedContent/insecure-video-in-main-frame-expected.txt (102299 => 102300)


--- trunk/LayoutTests/platform/chromium-cg-mac-snowleopard/http/tests/security/mixedContent/insecure-video-in-main-frame-expected.txt	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/LayoutTests/platform/chromium-cg-mac-snowleopard/http/tests/security/mixedContent/insecure-video-in-main-frame-expected.txt	2011-12-08 02:45:00 UTC (rev 102300)
@@ -1,15 +0,0 @@
-main frame - didStartProvisionalLoadForFrame
-main frame - didFinishDocumentLoadForFrame
-main frame - didHandleOnloadEventsForFrame
-main frame - didFinishLoadForFrame
-main frame - didCommitLoadForFrame
-main frame - didFinishDocumentLoadForFrame
-main frame - didHandleOnloadEventsForFrame
-main frame - didFinishLoadForFrame
-CONSOLE MESSAGE: line 1: The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-video.html displayed insecure content from http://127.0.0.1:8080/resources/test.ogv.
-
-didDisplayInsecureContent
-CONSOLE MESSAGE: line 1: The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-video.html displayed insecure content from http://127.0.0.1:8080/resources/test.ogv.
-
-didDisplayInsecureContent
-This test opens a window that loads an insecure video. We should trigger a mixed content callback because the main frame in the window is HTTPS but is displaying insecure content.

Deleted: trunk/LayoutTests/platform/chromium-cg-mac-snowleopard/http/tests/security/mixedContent/redirect-http-to-https-video-in-main-frame-expected.txt (102299 => 102300)


--- trunk/LayoutTests/platform/chromium-cg-mac-snowleopard/http/tests/security/mixedContent/redirect-http-to-https-video-in-main-frame-expected.txt	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/LayoutTests/platform/chromium-cg-mac-snowleopard/http/tests/security/mixedContent/redirect-http-to-https-video-in-main-frame-expected.txt	2011-12-08 02:45:00 UTC (rev 102300)
@@ -1,15 +0,0 @@
-main frame - didStartProvisionalLoadForFrame
-main frame - didFinishDocumentLoadForFrame
-main frame - didHandleOnloadEventsForFrame
-main frame - didFinishLoadForFrame
-main frame - didCommitLoadForFrame
-main frame - didFinishDocumentLoadForFrame
-main frame - didHandleOnloadEventsForFrame
-main frame - didFinishLoadForFrame
-CONSOLE MESSAGE: line 1: The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-redirect-http-to-https-video.html displayed insecure content from http://127.0.0.1:8080/security/resources/redir.php?url=""
-
-didDisplayInsecureContent
-CONSOLE MESSAGE: line 1: The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-redirect-http-to-https-video.html displayed insecure content from http://127.0.0.1:8080/security/resources/redir.php?url=""
-
-didDisplayInsecureContent
-This test opens a window that loads an insecure video(via a tricky redirect). We should trigger a mixed content callback because the main frame in the window is HTTPS but is displaying insecure content.

Deleted: trunk/LayoutTests/platform/chromium-mac-snowleopard/http/tests/security/mixedContent/insecure-video-in-main-frame-expected.txt (102299 => 102300)


--- trunk/LayoutTests/platform/chromium-mac-snowleopard/http/tests/security/mixedContent/insecure-video-in-main-frame-expected.txt	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/LayoutTests/platform/chromium-mac-snowleopard/http/tests/security/mixedContent/insecure-video-in-main-frame-expected.txt	2011-12-08 02:45:00 UTC (rev 102300)
@@ -1,15 +0,0 @@
-main frame - didStartProvisionalLoadForFrame
-main frame - didFinishDocumentLoadForFrame
-main frame - didHandleOnloadEventsForFrame
-main frame - didFinishLoadForFrame
-main frame - didCommitLoadForFrame
-main frame - didFinishDocumentLoadForFrame
-main frame - didHandleOnloadEventsForFrame
-main frame - didFinishLoadForFrame
-CONSOLE MESSAGE: line 1: The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-video.html displayed insecure content from http://127.0.0.1:8080/resources/test.ogv.
-
-didDisplayInsecureContent
-CONSOLE MESSAGE: line 1: The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-video.html displayed insecure content from http://127.0.0.1:8080/resources/test.ogv.
-
-didDisplayInsecureContent
-This test opens a window that loads an insecure video. We should trigger a mixed content callback because the main frame in the window is HTTPS but is displaying insecure content.

Deleted: trunk/LayoutTests/platform/chromium-mac-snowleopard/http/tests/security/mixedContent/redirect-http-to-https-video-in-main-frame-expected.txt (102299 => 102300)


--- trunk/LayoutTests/platform/chromium-mac-snowleopard/http/tests/security/mixedContent/redirect-http-to-https-video-in-main-frame-expected.txt	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/LayoutTests/platform/chromium-mac-snowleopard/http/tests/security/mixedContent/redirect-http-to-https-video-in-main-frame-expected.txt	2011-12-08 02:45:00 UTC (rev 102300)
@@ -1,15 +0,0 @@
-main frame - didStartProvisionalLoadForFrame
-main frame - didFinishDocumentLoadForFrame
-main frame - didHandleOnloadEventsForFrame
-main frame - didFinishLoadForFrame
-main frame - didCommitLoadForFrame
-main frame - didFinishDocumentLoadForFrame
-main frame - didHandleOnloadEventsForFrame
-main frame - didFinishLoadForFrame
-CONSOLE MESSAGE: line 1: The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-redirect-http-to-https-video.html displayed insecure content from http://127.0.0.1:8080/security/resources/redir.php?url=""
-
-didDisplayInsecureContent
-CONSOLE MESSAGE: line 1: The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-redirect-http-to-https-video.html displayed insecure content from http://127.0.0.1:8080/security/resources/redir.php?url=""
-
-didDisplayInsecureContent
-This test opens a window that loads an insecure video(via a tricky redirect). We should trigger a mixed content callback because the main frame in the window is HTTPS but is displaying insecure content.

Modified: trunk/LayoutTests/platform/gtk/Skipped (102299 => 102300)


--- trunk/LayoutTests/platform/gtk/Skipped	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/LayoutTests/platform/gtk/Skipped	2011-12-08 02:45:00 UTC (rev 102300)
@@ -1595,11 +1595,6 @@
 # https://bugs.webkit.org/show_bug.cgi?id=73583
 fullscreen/video-controls-override.html
 
-# https://bugs.webkit.org/show_bug.cgi?id=73743
-http/tests/security/mixedContent/insecure-video-in-main-frame.html
-http/tests/security/mixedContent/redirect-http-to-https-video-in-main-frame.html
-http/tests/security/mixedContent/redirect-https-to-http-video-in-main-frame.html
-
 # https://bugs.webkit.org/show_bug.cgi?id=73769
 svg/text/text-style-recalc-crash.html
 

Modified: trunk/LayoutTests/platform/qt/Skipped (102299 => 102300)


--- trunk/LayoutTests/platform/qt/Skipped	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/LayoutTests/platform/qt/Skipped	2011-12-08 02:45:00 UTC (rev 102300)
@@ -2519,12 +2519,6 @@
 # https://bugs.webkit.org/show_bug.cgi?id=73660
 fast/forms/select/listbox-in-multi-column.html
 
-# New test introduced in r101883 fail
-# https://bugs.webkit.org/show_bug.cgi?id=72178
-http/tests/security/mixedContent/insecure-video-in-main-frame.html
-http/tests/security/mixedContent/redirect-http-to-https-video-in-main-frame.html
-http/tests/security/mixedContent/redirect-https-to-http-video-in-main-frame.html
-
 # [Qt] REGRESSION(101967): It made editing/style/iframe-onload-crash-mac.html timeout
 # https://bugs.webkit.org/show_bug.cgi?id=73802
 editing/style/iframe-onload-crash-mac.html

Modified: trunk/Source/WebCore/ChangeLog (102299 => 102300)


--- trunk/Source/WebCore/ChangeLog	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/Source/WebCore/ChangeLog	2011-12-08 02:45:00 UTC (rev 102300)
@@ -1,3 +1,25 @@
+2011-12-07  Aaron Colwell  <[email protected]>
+
+        Revert mixed content handling for video fix and follow-up test expectations & Skipped changes.
+        (r101883, r101918, r101927, r101981, r101986, r101997)
+        https://bugs.webkit.org/show_bug.cgi?id=72178
+
+        Reviewed by Adam Barth.
+
+        * loader/SubresourceLoader.cpp:
+        (WebCore::SubresourceLoader::willSendRequest):
+        * loader/cache/CachedRawResource.cpp:
+        * loader/cache/CachedRawResource.h:
+        * loader/cache/CachedResource.cpp:
+        (WebCore::defaultPriorityForResourceType):
+        (WebCore::cachedResourceTypeToTargetType):
+        * loader/cache/CachedResource.h:
+        * loader/cache/CachedResourceLoader.cpp:
+        (WebCore::createResource):
+        (WebCore::CachedResourceLoader::checkInsecureContent):
+        (WebCore::CachedResourceLoader::canRequest):
+        (WebCore::CachedResourceLoader::requestResource):
+
 2011-12-07  Ryuan Choi  <[email protected]>
 
         [EFL] Introduce AssertMatchingEnums.cpp.

Modified: trunk/Source/WebCore/loader/SubresourceLoader.cpp (102299 => 102300)


--- trunk/Source/WebCore/loader/SubresourceLoader.cpp	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/Source/WebCore/loader/SubresourceLoader.cpp	2011-12-08 02:45:00 UTC (rev 102300)
@@ -128,16 +128,10 @@
 {
     // Store the previous URL because the call to ResourceLoader::willSendRequest will modify it.
     KURL previousURL = request().url();
-    CachedResource::Type requestTypeForCanRequest = m_resource->type();
-
-#if PLATFORM(CHROMIUM)
-    if (requestTypeForCanRequest == CachedResource::RawResource)
-        requestTypeForCanRequest = CachedResource::targetTypeToCachedResourceType(request().targetType());
-#endif
-
+    
     ResourceLoader::willSendRequest(newRequest, redirectResponse);
     if (!previousURL.isNull() && !newRequest.isNull() && previousURL != newRequest.url()) {
-        if (!m_document->cachedResourceLoader()->canRequest(requestTypeForCanRequest, newRequest.url())) {
+        if (!m_document->cachedResourceLoader()->canRequest(m_resource->type(), newRequest.url())) {
             cancel();
             return;
         }

Modified: trunk/Source/WebCore/loader/cache/CachedRawResource.cpp (102299 => 102300)


--- trunk/Source/WebCore/loader/cache/CachedRawResource.cpp	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/Source/WebCore/loader/cache/CachedRawResource.cpp	2011-12-08 02:45:00 UTC (rev 102300)
@@ -41,12 +41,6 @@
 {
 }
 
-CachedRawResource::CachedRawResource(ResourceRequest& resourceRequest, Type type)
-    : CachedResource(resourceRequest, type)
-    , m_dataLength(0)
-{
-}
-
 void CachedRawResource::data(PassRefPtr<SharedBuffer> data, bool allDataReceived)
 {
     CachedResourceHandle<CachedRawResource> protect(this);

Modified: trunk/Source/WebCore/loader/cache/CachedRawResource.h (102299 => 102300)


--- trunk/Source/WebCore/loader/cache/CachedRawResource.h	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/Source/WebCore/loader/cache/CachedRawResource.h	2011-12-08 02:45:00 UTC (rev 102300)
@@ -30,8 +30,7 @@
 
 class CachedRawResource : public CachedResource {
 public:
-    explicit CachedRawResource(ResourceRequest&);
-    CachedRawResource(ResourceRequest&, Type);
+    CachedRawResource(ResourceRequest&);
 
     // FIXME: AssociatedURLLoader shouldn't be a DocumentThreadableLoader and therefore shouldn't
     // use CachedRawResource. However, it is, and it needs to be able to defer loading.

Modified: trunk/Source/WebCore/loader/cache/CachedResource.cpp (102299 => 102300)


--- trunk/Source/WebCore/loader/cache/CachedResource.cpp	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/Source/WebCore/loader/cache/CachedResource.cpp	2011-12-08 02:45:00 UTC (rev 102300)
@@ -74,10 +74,6 @@
         case CachedResource::LinkSubresource:
             return ResourceLoadPriorityVeryLow;
 #endif
-#if ENABLE(VIDEO)
-        case CachedResource::MediaResource:
-            return ResourceLoadPriorityMedium;
-#endif
 #if ENABLE(VIDEO_TRACK)
         case CachedResource::TextTrackResource:
             return ResourceLoadPriorityLow;
@@ -116,10 +112,6 @@
     case CachedResource::LinkSubresource:
         return ResourceRequest::TargetIsSubresource;
 #endif
-#if ENABLE(VIDEO)
-    case CachedResource::MediaResource:
-        return ResourceRequest::TargetIsMedia;
-#endif
 #if ENABLE(VIDEO_TRACK)
     case CachedResource::TextTrackResource:
         return ResourceRequest::TargetIsTextTrack;
@@ -128,51 +120,8 @@
     ASSERT_NOT_REACHED();
     return ResourceRequest::TargetIsSubresource;
 }
-
-CachedResource::Type CachedResource::targetTypeToCachedResourceType(ResourceRequest::TargetType type)
-{
-    switch (type) {
-    case ResourceRequest::TargetIsStyleSheet:
-        return CachedResource::CSSStyleSheet;
-    case ResourceRequest::TargetIsScript:
-        return CachedResource::Script;
-    case ResourceRequest::TargetIsFontResource:
-        return CachedResource::FontResource;
-    case ResourceRequest::TargetIsImage:
-    case ResourceRequest::TargetIsFavicon:
-        return CachedResource::ImageResource;
-    case ResourceRequest::TargetIsSubresource:
-        return CachedResource::RawResource;
-    case ResourceRequest::TargetIsWorker:
-    case ResourceRequest::TargetIsSharedWorker:
-        return CachedResource::Script;
-    case ResourceRequest::TargetIsObject:
-    case ResourceRequest::TargetIsMainFrame:
-    case ResourceRequest::TargetIsSubframe:
-    case ResourceRequest::TargetIsXHR:
-    case ResourceRequest::TargetIsUnspecified:
-        return CachedResource::RawResource;
-#if ENABLE(LINK_PREFETCH)
-    case ResourceRequest::TargetIsPrefetch:
-        return CachedResource::LinkPrefetch;
-    case ResourceRequest::TargetIsPrerender:
-        return CachedResource::LinkPrerender;
 #endif
-#if ENABLE(VIDEO)
-    case ResourceRequest::TargetIsMedia:
-        return CachedResource::MediaResource;
-#endif
-#if ENABLE(VIDEO_TRACK)
-    case ResourceRequest::TargetIsTextTrack:
-        return CachedResource::TextTrackResource;
-#endif
-    }
-    ASSERT_NOT_REACHED();
-    return CachedResource::RawResource;
-}
 
-#endif
-
 DEFINE_DEBUG_ONLY_GLOBAL(RefCountedLeakCounter, cachedResourceLeakCounter, ("CachedResource"));
 
 CachedResource::CachedResource(const ResourceRequest& request, Type type)

Modified: trunk/Source/WebCore/loader/cache/CachedResource.h (102299 => 102300)


--- trunk/Source/WebCore/loader/cache/CachedResource.h	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/Source/WebCore/loader/cache/CachedResource.h	2011-12-08 02:45:00 UTC (rev 102300)
@@ -79,9 +79,6 @@
 #if ENABLE(CSS_SHADERS)
         , ShaderResource
 #endif
-#if ENABLE(VIDEO)
-        , MediaResource
-#endif
     };
 
     enum Status {
@@ -241,8 +238,6 @@
     virtual void didSendData(unsigned long long /* bytesSent */, unsigned long long /* totalBytesToBeSent */) { }
 #if PLATFORM(CHROMIUM)
     virtual void didDownloadData(int) { }
-
-    static Type targetTypeToCachedResourceType(ResourceRequest::TargetType);
 #endif
 
     void setLoadFinishTime(double finishTime) { m_loadFinishTime = finishTime; }

Modified: trunk/Source/WebCore/loader/cache/CachedResourceLoader.cpp (102299 => 102300)


--- trunk/Source/WebCore/loader/cache/CachedResourceLoader.cpp	2011-12-08 02:27:22 UTC (rev 102299)
+++ trunk/Source/WebCore/loader/cache/CachedResourceLoader.cpp	2011-12-08 02:45:00 UTC (rev 102300)
@@ -88,10 +88,6 @@
     case CachedResource::LinkSubresource:
         return new CachedResource(request, CachedResource::LinkSubresource);
 #endif
-#if ENABLE(VIDEO)
-    case CachedResource::MediaResource:
-        return new CachedRawResource(request, CachedResource::MediaResource);
-#endif
 #if ENABLE(VIDEO_TRACK)
     case CachedResource::TextTrackResource:
         return new CachedTextTrack(request);
@@ -257,9 +253,6 @@
             if (!f->loader()->checkIfRunInsecureContent(m_document->securityOrigin(), url))
                 return false;
         break;
-#if ENABLE(VIDEO)
-    case CachedResource::MediaResource:
-#endif
 #if ENABLE(VIDEO_TRACK)
     case CachedResource::TextTrackResource:
 #endif
@@ -311,9 +304,6 @@
     case CachedResource::LinkPrerender:
     case CachedResource::LinkSubresource:
 #endif
-#if ENABLE(VIDEO)
-    case CachedResource::MediaResource:
-#endif
 #if ENABLE(VIDEO_TRACK)
     case CachedResource::TextTrackResource:
 #endif
@@ -379,11 +369,8 @@
     case CachedResource::LinkSubresource:
 #endif
         break;
-#if ENABLE(VIDEO)
-    case CachedResource::MediaResource:
 #if ENABLE(VIDEO_TRACK)
     case CachedResource::TextTrackResource:
-#endif
         // Cues aren't called out in the CPS spec yet, but they only work with a media element
         // so use the media policy.
         if (!m_document->contentSecurityPolicy()->allowMediaFromSource(url))
@@ -415,14 +402,7 @@
     if (!url.isValid())
         return 0;
 
-    CachedResource::Type requestTypeForCanRequest = type;
-
-#if PLATFORM(CHROMIUM)
-    if (requestTypeForCanRequest == CachedResource::RawResource)
-        requestTypeForCanRequest = CachedResource::targetTypeToCachedResourceType(request.targetType());
-#endif
-
-    if (!canRequest(requestTypeForCanRequest, url, forPreload))
+    if (!canRequest(type, url, forPreload))
         return 0;
 
     if (memoryCache()->disabled()) {
_______________________________________________
webkit-changes mailing list
[email protected]
http://lists.webkit.org/mailman/listinfo.cgi/webkit-changes

Reply via email to