[Webkit-unassigned] [Bug 162777] New: [SOUP] Cleanup persistent credential storage code

bugzilla-daemon at webkit.org bugzilla-daemon at webkit.org
Fri Sep 30 03:02:22 PDT 2016


https://bugs.webkit.org/show_bug.cgi?id=162777

            Bug ID: 162777
           Summary: [SOUP] Cleanup persistent credential storage code
    Classification: Unclassified
           Product: WebKit
           Version: WebKit Local Build
          Hardware: Unspecified
                OS: Unspecified
            Status: NEW
          Keywords: Gtk, Soup
          Severity: Normal
          Priority: P2
         Component: Platform
          Assignee: webkit-unassigned at lists.webkit.org
          Reporter: cgarcia at igalia.com
                CC: achristensen at apple.com, bugs-noreply at webkitgtk.org,
                    svillar at igalia.com

We have this feature behind ENABLE_CREDENTIAL_STORAGE flag, which is confusing, because we use credential storage unconditionally and this is only about persistent storage. Also the flag assumes libsecret is available, and since it's only used by GTK sometimes we use GTK ifdefs instead of CREDENTIAL_STORAGE. So, I think we should use USE(LIBSECRET) instead, and reduce a bit the ifdefs in common soup code. Another problem is that current implementation is always used, while it should depend on the current network storage session and never used in ephemeral sessions.

-- 
You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.webkit.org/pipermail/webkit-unassigned/attachments/20160930/f893f5ca/attachment.html>


More information about the webkit-unassigned mailing list