[Webkit-unassigned] [Bug 178606] New: http/tests/security/clipboard/drag-drop-html-cross-origin-iframe-in-same-origin.html is flaky

bugzilla-daemon at webkit.org bugzilla-daemon at webkit.org
Fri Oct 20 16:07:07 PDT 2017


https://bugs.webkit.org/show_bug.cgi?id=178606

            Bug ID: 178606
           Summary: http/tests/security/clipboard/drag-drop-html-cross-ori
                    gin-iframe-in-same-origin.html is flaky
           Product: WebKit
           Version: WebKit Nightly Build
          Hardware: Unspecified
                OS: Unspecified
            Status: NEW
          Severity: Normal
          Priority: P2
         Component: New Bugs
          Assignee: webkit-unassigned at lists.webkit.org
          Reporter: jlewis3 at apple.com
                CC: rniwa at webkit.org

http/tests/security/clipboard/drag-drop-html-cross-origin-iframe-in-same-origin.html is a flaky failure according to the dashboard.

https://webkit-test-results.webkit.org/dashboards/flakiness_dashboard.html#showAllRuns=true&tests=http%2Ftests%2Fsecurity%2Fclipboard%2Fdrag-drop-html-cross-origin-iframe-in-same-origin.html


https://build.webkit.org/results/Apple%20El%20Capitan%20Release%20WK1%20(Tests)/r223795%20(5616)/results.html
https://build.webkit.org/builders/Apple%20El%20Capitan%20Release%20WK1%20(Tests)/builds/5616

--- /Volumes/Data/slave/elcapitan-release-tests-wk1/build/layout-test-results/http/tests/security/clipboard/drag-drop-html-cross-origin-iframe-in-same-origin-expected.txt
+++ /Volumes/Data/slave/elcapitan-release-tests-wk1/build/layout-test-results/http/tests/security/clipboard/drag-drop-html-cross-origin-iframe-in-same-origin-actual.txt
@@ -1,4 +1,3 @@
-CONSOLE MESSAGE: line 233: Blocked a frame with origin "http://127.0.0.1:8000" from accessing a frame with origin "http://localhost:8000". Protocols, domains, and ports must match.
 This tests draggin and dropping HTML by the default action. WebKit should not sanitize the HTML in the same document.
 To manually test, drag & drop the content in the block above to the blue box on the right.

@@ -17,7 +16,7 @@
 PASS destination.innerHTML.includes("dangerousCode") is false
 PASS destination.querySelector("img"); !!img is true
 PASS new URL(img.src).protocol is "http:"
-PASS destination.querySelector("iframe").contentDocument is null
+FAIL destination.querySelector("iframe").contentDocument should be null. Was [object HTMLDocument].
 PASS successfullyParsed is true

 TEST COMPLETE

This was flaky on WK1 since it was added

-- 
You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.webkit.org/pipermail/webkit-unassigned/attachments/20171020/3624ea0f/attachment.html>


More information about the webkit-unassigned mailing list