[Webkit-unassigned] [Bug 161052] New: http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/upgrade-insecure-fetch-in-main-frame.html fails

bugzilla-daemon at webkit.org bugzilla-daemon at webkit.org
Mon Aug 22 12:37:20 PDT 2016


https://bugs.webkit.org/show_bug.cgi?id=161052

            Bug ID: 161052
           Summary: http/tests/security/contentSecurityPolicy/upgrade-inse
                    cure-requests/upgrade-insecure-fetch-in-main-frame.htm
                    l fails
    Classification: Unclassified
           Product: WebKit
           Version: Safari 9
          Hardware: Unspecified
                OS: Unspecified
            Status: NEW
          Severity: Normal
          Priority: P2
         Component: Tools / Tests
          Assignee: webkit-unassigned at lists.webkit.org
          Reporter: ap at webkit.org
                CC: bfulgham at webkit.org, dbates at webkit.org,
                    lforschler at apple.com, ryanhaddad at apple.com,
                    youennf at gmail.com

http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/upgrade-insecure-fetch-in-main-frame.html fails every time on my machine (that has macOS Sierra):

@@ -1,2 +1,2 @@
-ALERT: PASS: load was not blocked
+ALERT: FAIL: load is not successful
 This test opens a HTTPS window that loads insecure data via the Fetch API. We should upgrade this request and thereby avoid a mixed content resource load.

Not sure why it's not failing on the bots. I just run it like this, no fancy options:

run-webkit-tests http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/upgrade-insecure-fetch-in-main-frame.html

-- 
You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.webkit.org/pipermail/webkit-unassigned/attachments/20160822/f0118382/attachment.html>


More information about the webkit-unassigned mailing list