[Webkit-unassigned] [Bug 180957] Client certificate authentication using webkit2gtk
bugzilla-daemon at webkit.org
bugzilla-daemon at webkit.org
Sat Dec 1 06:34:41 PST 2018
https://bugs.webkit.org/show_bug.cgi?id=180957
Adrian Perez <aperez at igalia.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
CC| |aperez at igalia.com
Resolution|--- |DUPLICATE
--- Comment #1 from Adrian Perez <aperez at igalia.com> ---
(In reply to srujanrk from comment #0)
> I am currently porting my code from webkit1 to webkit2gtk.
> I couldn't find any API to intercept the TLS handshake for handling client
> certificate request.
>
> In webkit-1, I used to achieve it by using below APIs.
> soupSession = webkit_get_default_session();
> GetTlsCertInteraction *interaction;
> interaction =
> (GetTlsCertInteraction *)g_object_new
> (_get_tls_cert_interaction_get_type (), NULL);
> g_object_set (gSoupSession, SOUP_SESSION_TLS_INTERACTION, interaction,
> NULL);
>
> However in webkit2, the webkit_get_default_session() API is not available
> anymore.
This is because of the process split in WebKit2, where fetching content
is done in the WebKitNetworkProcess, which means that the libsoup usage
cannot be directly made in the so called “UI Process” (e.g. a browser)
where the public API is used.
> Can you please let me know if client certificate authentication supported in
> webkit2gtk for Linux (Ubuntu 16.04)?
> Any pointers on how to achieve this will be of great help.
I think what you would need is to watch bug #164509 of which I think
this is a duplicate (but feel free to reopen otherwise).
*** This bug has been marked as a duplicate of bug 164509 ***
--
You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.webkit.org/pipermail/webkit-unassigned/attachments/20181201/14ee555d/attachment-0001.html>
More information about the webkit-unassigned
mailing list