[Webkit-unassigned] [Bug 161052] New: http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/upgrade-insecure-fetch-in-main-frame.html fails
bugzilla-daemon at webkit.org
bugzilla-daemon at webkit.org
Mon Aug 22 12:37:20 PDT 2016
https://bugs.webkit.org/show_bug.cgi?id=161052
Bug ID: 161052
Summary: http/tests/security/contentSecurityPolicy/upgrade-inse
cure-requests/upgrade-insecure-fetch-in-main-frame.htm
l fails
Classification: Unclassified
Product: WebKit
Version: Safari 9
Hardware: Unspecified
OS: Unspecified
Status: NEW
Severity: Normal
Priority: P2
Component: Tools / Tests
Assignee: webkit-unassigned at lists.webkit.org
Reporter: ap at webkit.org
CC: bfulgham at webkit.org, dbates at webkit.org,
lforschler at apple.com, ryanhaddad at apple.com,
youennf at gmail.com
http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/upgrade-insecure-fetch-in-main-frame.html fails every time on my machine (that has macOS Sierra):
@@ -1,2 +1,2 @@
-ALERT: PASS: load was not blocked
+ALERT: FAIL: load is not successful
This test opens a HTTPS window that loads insecure data via the Fetch API. We should upgrade this request and thereby avoid a mixed content resource load.
Not sure why it's not failing on the bots. I just run it like this, no fancy options:
run-webkit-tests http/tests/security/contentSecurityPolicy/upgrade-insecure-requests/upgrade-insecure-fetch-in-main-frame.html
--
You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.webkit.org/pipermail/webkit-unassigned/attachments/20160822/f0118382/attachment.html>
More information about the webkit-unassigned
mailing list