RESOLVED FIXED 65330
Remove auth-related functions from SubresourceLoaderClient
https://bugs.webkit.org/show_bug.cgi?id=65330
Summary Remove auth-related functions from SubresourceLoaderClient
Nate Chapin
Reported 2011-07-28 11:34:51 PDT
It appears that getShouldUseCredentialStorage(), didReceiveAuthenticationChallenge() and receivedCancellation() don't actually do much (in the various SubresourceLoaderClients). The code would probably be simpler if we pushed the little bit of logic in the clients down into SubresourceLoader and got rid of these callbacks. It would also make efforts like https://bugs.webkit.org/show_bug.cgi?id=61225 easier by reducing the number of callbacks that need to be rewired. Patch shortly.
Attachments
patch (24.15 KB, patch)
2011-07-28 11:38 PDT, Nate Chapin
no flags
Remove getShouldUseCredentialStorage() (5.68 KB, patch)
2011-08-04 13:30 PDT, Nate Chapin
no flags
Remove didReceiveAuthenticationChallenge() (5.68 KB, patch)
2011-08-04 14:58 PDT, Nate Chapin
no flags
Remove didReceiveAuthenticationChallenge() (15.21 KB, patch)
2011-08-04 15:22 PDT, Nate Chapin
no flags
Remove receivedCancellation() (10.56 KB, patch)
2011-08-05 09:28 PDT, Nate Chapin
no flags
Remove receivedCancellation() - with better ChangeLog (10.97 KB, patch)
2011-08-08 16:53 PDT, Nate Chapin
no flags
Remove getShouldUseCredentialStorage() - with more ChangeLog (5.82 KB, patch)
2011-08-17 10:22 PDT, Nate Chapin
no flags
Remove didReceiveAuthenticationChallenge() - more ChangeLog (15.32 KB, patch)
2011-08-17 11:16 PDT, Nate Chapin
ap: review-
ap: commit-queue-
Remove didReceiveAuthenticationChallenge() #3 (15.46 KB, patch)
2011-08-22 13:28 PDT, Nate Chapin
no flags
Remove getShouldUseCredentialStorage() without the allowCookies() check (11.95 KB, patch)
2011-08-26 14:42 PDT, Nate Chapin
no flags
Remove didReceiveAuthenticationChallenge() #4 (18.03 KB, patch)
2011-08-30 11:09 PDT, Nate Chapin
no flags
Remove didReceiveAuthenticationChallenge() - minus style issue (18.09 KB, patch)
2011-08-30 12:11 PDT, Nate Chapin
no flags
Remove didReceiveAuthenticationChallenge() - rename enum values (18.00 KB, patch)
2011-09-21 15:03 PDT, Nate Chapin
no flags
Nate Chapin
Comment 1 2011-07-28 11:38:45 PDT
Created attachment 102275 [details] patch All the LayoutTests still pass, and I've done a little bit of manual browsing with the patch (I plan on doing some more). If there's something in particular I should be testing manually, suggestions are appreciated.
Adam Barth
Comment 2 2011-07-28 11:56:27 PDT
This looks like a good change. I'm going to give other folks a chance to comment though.
Alexey Proskuryakov
Comment 3 2011-07-28 11:57:53 PDT
I'm on vacation now, but would like to take a close look next week. I vaguely recall that getShouldUseCredentialStorage() in particular is supposed to be filtered down to WebKit client.
Nate Chapin
Comment 4 2011-07-28 12:02:36 PDT
(In reply to comment #3) > I'm on vacation now, but would like to take a close look next week. > > I vaguely recall that getShouldUseCredentialStorage() in particular is supposed to be filtered down to WebKit client. If I changed any of the calls back to the WebKit client, it's a bug. :) This should only change calls that are made to DocumentThreadableLoader (and therefore the ThreadableLoaderClients) and IconLoader.
Alexey Proskuryakov
Comment 5 2011-08-01 17:03:52 PDT
Comment on attachment 102275 [details] patch View in context: https://bugs.webkit.org/attachment.cgi?id=102275&action=review I like the direction of this patch. I didn't review it in a lot of detail yet, because I had some general comments that I think you may want to address first. FrameLoaderClient calls are made from ResourceLoader, which is why changing SubresourceLoader shouldn't affect them indeed - we just need to make sure that we fall through to ResourceLoader in all the same cases. > Source/WebCore/loader/ResourceLoader.cpp:524 > + if (!m_request.allowCookies()) > + return false; This is worth at least a comment explaining why we tie cookies and HTTP credentials together like this. > Source/WebCore/loader/ResourceLoader.cpp:559 > + didReceiveResponse(challenge.failureResponse()); In XMLHttpRequest case at least, this will change when InspectorInstrumentation is notified. Is that an improvement? For MainResourceLoader, this changes a lot of code that runs in this case. Why is that OK? The changes that went to ResourceLoader particularly worry me, because the patch is supposed to only affect subresources. Perhaps this would be easier to review if there were three patches, one for each SubresourceLoaderClient method that's being removed. It's rather difficult for me to follow every code path, given that this patch actually changes what code is being run. > Source/WebCore/loader/SubresourceLoader.cpp:254 > + // Only these platforms provide a way to continue without credentials, and users shouldn't be prompted > + // for credentials on a cross-origin request. Fall through and cancel for other platfroms. Typo: platfroms. > Source/WebCore/loader/SubresourceLoader.cpp:261 > + case AuthenticateNever: > + cancel(); It's a mystery why we'd try to continue without credentials in AuthenticateSameOrigin, but not in AuthenticateNever. Another subtlety is when it's OK to use stored session credentials, and when it's OK to ask a user for credentials. These are separate questions, but the AuthenticateWhen naming scheme doesn't differentiate between the two. I think that for this change to really be an improvement, SubresourceLoader options should be direct and straightforward, without traps like these. > Source/WebCore/loader/SubresourceLoader.cpp:264 > + default: > + ASSERT_NOT_REACHED(); Is there a specific reason to add this default clause? It prevents the compiler from generating an error if some cases are not handled.
Nate Chapin
Comment 6 2011-08-04 12:03:36 PDT
r/SubresourceLoader.cpp:261 > > + case AuthenticateNever: > > + cancel(); > > It's a mystery why we'd try to continue without credentials in AuthenticateSameOrigin, but not in AuthenticateNever. > > Another subtlety is when it's OK to use stored session credentials, and when it's OK to ask a user for credentials. These are separate questions, but the AuthenticateWhen naming scheme doesn't differentiate between the two. If I'm reading this correctly, it appears ResourceHandle calls ResourceLoader::shouldUseCredentialStorage() and uses credential storage first, and only calls ResourceLoader::didReceiveAuthenticationChallenge() if stored credentials are no longer an option.
Alexey Proskuryakov
Comment 7 2011-08-04 12:10:16 PDT
That suggest that better names could be something like NeverAskUserForCredentials instead of AuthenticateNever.
Nate Chapin
Comment 8 2011-08-04 12:22:25 PDT
(In reply to comment #7) > That suggest that better names could be something like NeverAskUserForCredentials instead of AuthenticateNever. Good point, I'll rename that stuff. I think I'll follow your other suggestion and split this into a separate patch for each function, too.
Nate Chapin
Comment 9 2011-08-04 13:30:09 PDT
Created attachment 102970 [details] Remove getShouldUseCredentialStorage() I gave my best shot at explaining the logic for the allowCookies() check in ResourceLoader::shouldUseCredentialStorage(), let me know if I said something stupid :)
Nate Chapin
Comment 10 2011-08-04 14:58:08 PDT
Created attachment 102985 [details] Remove didReceiveAuthenticationChallenge()
Nate Chapin
Comment 11 2011-08-04 15:22:22 PDT
Created attachment 102990 [details] Remove didReceiveAuthenticationChallenge() Oops, uploaded the same patch twice.
Nate Chapin
Comment 12 2011-08-05 09:28:34 PDT
Created attachment 103077 [details] Remove receivedCancellation() After some more studying, it appears receivedCancellation() doesn't actually do anything in any SubresourceLoaderClient. Keep in mind that it's always followed by a didFail() because ResourceLoader::receivedCancellation() cancels the load. didFail() and receivedCancellation() do the same thing in both WorkerScriptLoader and Notification. In XMLHttpRequest, receivedCancellation() just sets m_response, and didFail() clears m_response before using it in any way.
Alexey Proskuryakov
Comment 13 2011-08-08 15:20:27 PDT
Comment on attachment 103077 [details] Remove receivedCancellation() Let's start with this patch, as it seems to be the simplest one. It is subtle however, because not every browser UI provides a way for the user to cancel an authentication dialog. However, clients may pick either behavior (cancel request altogether or continue without credentials and use whatever data comes with 401 response). Can you explain in ChangeLog why it's OK to make the change for each of the modified files? I'm particularly unsure about XMLHttpRequest - who will set m_response if didReceiveAuthenticationCancellation does not? Or how will WorkerScriptLoader know that it's in error state?
Nate Chapin
Comment 14 2011-08-08 15:23:28 PDT
(In reply to comment #13) > (From update of attachment 103077 [details]) > Let's start with this patch, as it seems to be the simplest one. It is subtle however, because not every browser UI provides a way for the user to cancel an authentication dialog. However, clients may pick either behavior (cancel request altogether or continue without credentials and use whatever data comes with 401 response). > > Can you explain in ChangeLog why it's OK to make the change for each of the modified files? I'm particularly unsure about XMLHttpRequest - who will set m_response if didReceiveAuthenticationCancellation does not? Or how will WorkerScriptLoader know that it's in error state? Will do. I'll essentially be rewording comment #12. :)
Alexey Proskuryakov
Comment 15 2011-08-08 16:41:35 PDT
> I'll essentially be rewording comment #12. :) I did overlook that comment indeed. Let's get it into ChangeLog though.
Nate Chapin
Comment 16 2011-08-08 16:53:37 PDT
Created attachment 103316 [details] Remove receivedCancellation() - with better ChangeLog
Alexey Proskuryakov
Comment 17 2011-08-09 10:19:09 PDT
Comment on attachment 103316 [details] Remove receivedCancellation() - with better ChangeLog View in context: https://bugs.webkit.org/attachment.cgi?id=103316&action=review > Source/WebCore/ChangeLog:9 > + Remove receivedCancellation() from SubresourceLoaderClient. > + It's a no-op because it's always immediately followed by a > + canceallation (ResourceLoader::receivedCancellation() calls > + cancel(), which leads to calling SubresourceLoaderClinet::didFail()). > + For WorkerScriptLoader and Notification, receivedCancellation() > + and didFail() are identical. For XMLHttpRequest, receivedCancellation() > + sets m_response, which didFail() clears before it can be used. Please don't put explanations into ChangeLog like this. There is an automatically generated list of files below. Simply listing modified files and functions is not very helpful, and the reason for the script to add it is that contributors will use it as a starting point. > Source/WebCore/xml/XMLHttpRequest.cpp:-1054 > -void XMLHttpRequest::didReceiveAuthenticationCancellation(unsigned long, const ResourceResponse& failureResponse) > -{ > - m_response = failureResponse; > -} This code was added in <http://trac.webkit.org/changeset/24862> without a regression test. But it does seem fine to remove it now - WebKit (at least ports that I checked) no longer does a cancellation when the user cancels an authentication sheet. It now asks WebKit to continue without credentials.
Nate Chapin
Comment 18 2011-08-09 12:40:39 PDT
Comment on attachment 103316 [details] Remove receivedCancellation() - with better ChangeLog receivedCancellation() removal landed: http://trac.webkit.org/changeset/92691
Alexey Proskuryakov
Comment 19 2011-08-16 16:47:48 PDT
Would you be willing to annotate ChangeLogs of the remaining patches with equally good explanations?
Nate Chapin
Comment 20 2011-08-17 08:34:22 PDT
(In reply to comment #19) > Would you be willing to annotate ChangeLogs of the remaining patches with equally good explanations? Sure. Will remove r? from the existing patches in the interim.
Nate Chapin
Comment 21 2011-08-17 10:22:44 PDT
Created attachment 104190 [details] Remove getShouldUseCredentialStorage() - with more ChangeLog Hopefully the changelog + comment in ResourceLoader.cpp covers this patch sufficiently.
WebKit Review Bot
Comment 22 2011-08-17 10:25:02 PDT
Attachment 104190 [details] did not pass style-queue: Failed to run "['Tools/Scripts/check-webkit-style', '--diff-files', u'Source/WebCore/ChangeLog', u'Source/WebCor..." exit_code: 1 Source/WebCore/ChangeLog:1: ChangeLog entry has no bug number [changelog/bugnumber] [5] Total errors found: 1 in 2 files If any of these errors are false positives, please file a bug against check-webkit-style.
Nate Chapin
Comment 23 2011-08-17 11:16:35 PDT
Created attachment 104198 [details] Remove didReceiveAuthenticationChallenge() - more ChangeLog
Alexey Proskuryakov
Comment 24 2011-08-17 12:32:52 PDT
Comment on attachment 104198 [details] Remove didReceiveAuthenticationChallenge() - more ChangeLog View in context: https://bugs.webkit.org/attachment.cgi?id=104198&action=review Thanks, the split patch is so much easier to review. Seems like this has a few rough edges, but looks like a nice improvement overall. One challenge is that existing cross origin policies are incorrect in that they are too limiting. When a cross-origin XMLHttpRequest is redirected, we should actually perform a new preflight, and not just bail out (not quite sure if we're allowed to ask the user for credentials after the redirect though). We might actually need to call into DocumentThreadableLoader, and in this sense, this patch could be a step in a wrong direction. Perhaps it's OK to make this step back to make existing code clearer, and think about implementing CORS redirects when we come to that. > Source/WebCore/ChangeLog:6 > + Note that this only Please, more, more ChangeLog! > Source/WebCore/loader/FrameLoaderTypes.h:127 > + enum UserCredentialPolicy { Despite what I said before, this is about asking the client, which will not necessarily ask the user. > Source/WebCore/loader/FrameLoaderTypes.h:130 > + AskUserForCredentialsAlways, > + AskUserForCredentialsSameOrigin, > + AskUserForCredentialsNever The enum values would benefit from being better formed grammatically (AskUserForCredentialsNever vs. NeverAskUserForCredentials). For AskUserForCredentialsSameOrigin in particular, I can't tell what this option does from looking at its name. Is it really AskUserForCredentialsUnlessRedirectedCrossOrigin? Or if it's about cross-origin requests, why can't we decide that upfront and pass AskUserForCredentialsNever? > Source/WebCore/loader/SubresourceLoader.cpp:260 > + if (m_frame->document()->securityOrigin()->canRequest(request().url())) This check doesn't seem to match what we had before. We looked at DocumentThreadableLoader::m_sameOriginRequest, which is set in constructor, while request() changes with every redirect. IIRC DocumentThreadableLoader just prevents cross origin redirects now (which is not correct according to the CORS spec), but you don't want to rely on the fact that DocumentThreadableLoader is the only client that passes AskUserForCredentialsSameOrigin. > Source/WebCore/loader/SubresourceLoader.cpp:269 > +#if PLATFORM(MAC) || USE(CFNETWORK) || USE(CURL) > + handle()->receivedRequestToContinueWithoutCredential(challenge); > +#endif > + if (handle()->hasAuthenticationChallenge()) > + cancel(); Old code also called didFail with blockedError. Why is that not needed? ChangeLog doesn't say.
Nate Chapin
Comment 25 2011-08-18 15:49:46 PDT
> One challenge is that existing cross origin policies are incorrect in that they are too limiting. When a cross-origin XMLHttpRequest is redirected, we should actually perform a new preflight, and not just bail out (not quite sure if we're allowed to ask the user for credentials after the redirect though). We might actually need to call into DocumentThreadableLoader, and in this sense, this patch could be a step in a wrong direction. Perhaps it's OK to make this step back to make existing code clearer, and think about implementing CORS redirects when we come to that. I'm sort of inclined to punt on this issue until we get around to dealing with CORS redirects, but I'm going to think about it some more before uploading a new patch. > > > Source/WebCore/ChangeLog:6 > > + Note that this only > > Please, more, more ChangeLog! I'll do my best :) > > > Source/WebCore/loader/FrameLoaderTypes.h:127 > > + enum UserCredentialPolicy { > > Despite what I said before, this is about asking the client, which will not necessarily ask the user. Hmm.....good point. ClientCredentialPolicy? > > > Source/WebCore/loader/SubresourceLoader.cpp:260 > > + if (m_frame->document()->securityOrigin()->canRequest(request().url())) > > This check doesn't seem to match what we had before. We looked at DocumentThreadableLoader::m_sameOriginRequest, which is set in constructor, while request() changes with every redirect. IIRC DocumentThreadableLoader just prevents cross origin redirects now (which is not correct according to the CORS spec), but you don't want to rely on the fact that DocumentThreadableLoader is the only client that passes AskUserForCredentialsSameOrigin. Good catch, that should be originalRequest() I think.
Nate Chapin
Comment 26 2011-08-22 13:28:12 PDT
Created attachment 104727 [details] Remove didReceiveAuthenticationChallenge() #3 Hopefully this is enough ChangeLog....not sure how I managed to leave that sentence fragment in the previous version.
Alexey Proskuryakov
Comment 27 2011-08-23 10:59:27 PDT
Comment on attachment 104190 [details] Remove getShouldUseCredentialStorage() - with more ChangeLog I'm feeling conflicted about this patch: 1. When looking at ResourceLoader code, it's unnatural to expect that some policy choices are overridden by a subclass. So, getting rid of that is good. 2. The weird check for m_request.allowCookies() is indeed weird. We had very clear and straightforward code in the client. I'm going to say r+, but could the real answer be to move the client call from SubresourceLoaderClient to ResourceLoaderClient, clarifying control flow in this way?
Nate Chapin
Comment 28 2011-08-24 12:49:09 PDT
(In reply to comment #27) > (From update of attachment 104190 [details]) > I'm feeling conflicted about this patch: > 1. When looking at ResourceLoader code, it's unnatural to expect that some policy choices are overridden by a subclass. So, getting rid of that is good. > 2. The weird check for m_request.allowCookies() is indeed weird. We had very clear and straightforward code in the client. > > I'm going to say r+, but could the real answer be to move the client call from SubresourceLoaderClient to ResourceLoaderClient, clarifying control flow in this way? We could plumb the relevant variable in ThreadableLoaderOptions (m_allowCredentials) down to SubresourceLoader? Not sure if that's better or worse.
Alexey Proskuryakov
Comment 29 2011-08-24 13:19:05 PDT
I think that this would be more straightforward than second-guessing from ResourceRequest's idea of whether to send cookies.
Nate Chapin
Comment 30 2011-08-24 16:45:23 PDT
(In reply to comment #29) > I think that this would be more straightforward than second-guessing from ResourceRequest's idea of whether to send cookies. I revived https://bugs.webkit.org/show_bug.cgi?id=63301 in the hope of making passing these sorts of parameters more sane than a long string of bools.
Nate Chapin
Comment 31 2011-08-26 14:42:18 PDT
Created attachment 105410 [details] Remove getShouldUseCredentialStorage() without the allowCookies() check
Alexey Proskuryakov
Comment 32 2011-08-26 15:24:54 PDT
Comment on attachment 105410 [details] Remove getShouldUseCredentialStorage() without the allowCookies() check Nice!
WebKit Review Bot
Comment 33 2011-08-26 16:32:11 PDT
Comment on attachment 105410 [details] Remove getShouldUseCredentialStorage() without the allowCookies() check Clearing flags on attachment: 105410 Committed r93923: <http://trac.webkit.org/changeset/93923>
Alexey Proskuryakov
Comment 34 2011-08-26 16:57:18 PDT
Comment on attachment 104727 [details] Remove didReceiveAuthenticationChallenge() #3 View in context: https://bugs.webkit.org/attachment.cgi?id=104727&action=review Some comments for discussion below. > Source/WebCore/ChangeLog:21 > + (WebCore::SubresourceLoader::didReceiveAuthenticationChallenge): Handle the authentication The good thing about two previous patches was that SubresourceLoader override was completely removed, making the logic much easier to follow. This is not the case here, so I'm not sure if the change is beneficial. > Source/WebCore/loader/cache/CachedResourceRequest.cpp:128 > + request.get(), resourceRequest, AlwaysAskClientForCredentials, priority, securityCheck, sendResourceLoadCallbacks); I wonder how important it is to show credentials dialog when a cross-origin subresource or subframe wants it. It's certainly confusing and dangerous. Definitely not something to change in this patch. > Source/WebCore/loader/icon/IconLoader.cpp:-131 > - m_resourceLoader->cancel(); This patch changes behavior for IconLoader in a way that's not mentioned in ChangeLog. We use to always cancel such requests, but now we attempt to continue without credentials. > Source/WebCore/loader/SubresourceLoader.cpp:269 > +#if PLATFORM(MAC) || USE(CFNETWORK) || USE(CURL) > + handle()->receivedRequestToContinueWithoutCredential(challenge); > +#endif > + if (handle()->hasAuthenticationChallenge()) > + didFail(blockedError()); I would add a comment explaining that receivedRequestToContinueWithoutCredential will normally clear the challenge. Or it might be even better to put the other case in #else, so that no one could get confused as to whether we do didFail() after receivedRequestToContinueWithoutCredential(). There is a comment above the part I quoted, but it's fairly indirect. Also, we used to have a cancel() call after didFail() in DocumentThreadableLoader::didReceiveAuthenticationChallenge, and IconLoader also performed a cancel(). Why is this OK to change? > Source/WebCore/loader/DocumentThreadableLoader.cpp:346 > + m_loader = resourceLoadScheduler()->scheduleSubresourceLoad(m_document->frame(), this, request, OnlyAskClientForCredentialsForSameOrigin, ResourceLoadPriorityMedium, securityCheck, sendLoadCallbacks, It would be good to have a FIXME comment, explaining how OnlyAskClientForCredentialsForSameOrigin is not a proper policy. But it may be difficult to write - I certainly cannot do that without consulting relevant specs.
Nate Chapin
Comment 35 2011-08-29 13:44:58 PDT
> The good thing about two previous patches was that SubresourceLoader override was completely removed, making the logic much easier to follow. This is not the case here, so I'm not sure if the change is beneficial. I was thinking about re-writing this patch to pass the policy via ResourceLoaderOptions, which would enable us to move all the login into ResourceLoader very easily. I'd need to figure out how to handle the similar between the StoredCredential policy and the new ClientCredentialPolicy, but it seems like it would still be cleaner.
Nate Chapin
Comment 36 2011-08-30 11:09:39 PDT
Created attachment 105654 [details] Remove didReceiveAuthenticationChallenge() #4
WebKit Review Bot
Comment 37 2011-08-30 11:11:20 PDT
Attachment 105654 [details] did not pass style-queue: Failed to run "['Tools/Scripts/check-webkit-style', '--diff-files', u'Source/WebCore/ChangeLog', u'Source/WebCor..." exit_code: 1 Source/WebCore/ChangeLog:1: ChangeLog entry has no bug number [changelog/bugnumber] [5] Total errors found: 1 in 11 files If any of these errors are false positives, please file a bug against check-webkit-style.
Nate Chapin
Comment 38 2011-08-30 12:11:47 PDT
Created attachment 105664 [details] Remove didReceiveAuthenticationChallenge() - minus style issue
Eric Seidel (no email)
Comment 39 2011-09-06 15:29:05 PDT
Comment on attachment 103316 [details] Remove receivedCancellation() - with better ChangeLog Cleared Alexey Proskuryakov's review+ from obsolete attachment 103316 [details] so that this bug does not appear in http://webkit.org/pending-commit.
Eric Seidel (no email)
Comment 40 2011-09-06 15:29:09 PDT
Comment on attachment 104190 [details] Remove getShouldUseCredentialStorage() - with more ChangeLog Cleared Alexey Proskuryakov's review+ from obsolete attachment 104190 [details] so that this bug does not appear in http://webkit.org/pending-commit.
Alexey Proskuryakov
Comment 41 2011-09-06 15:41:09 PDT
Comment on attachment 105664 [details] Remove didReceiveAuthenticationChallenge() - minus style issue View in context: https://bugs.webkit.org/attachment.cgi?id=105664&action=review > Source/WebCore/loader/ResourceLoaderOptions.h:66 > + { } These braces should be on separate lines now. > Source/WebCore/loader/ResourceLoaderOptions.h:71 > + ClientCrossOriginCredentialPolicy crossOriginCredentialPolicy; // Whether we will ask the client for credentials (if we allow credentials at all). This seems rather confusing. The options are AllowClientCrossOriginCredentials and BlockClientCrossOriginCredentials - I cannot easily connect those to whether we will ask the client.
Nate Chapin
Comment 42 2011-09-21 15:03:17 PDT
Created attachment 108242 [details] Remove didReceiveAuthenticationChallenge() - rename enum values Addressed ap's comments on previous patch. The new enum names are: AskClientForCrossOriginCredentials DoNotAskClientForCrossOriginCredentials Hopefully that's clearer.
Alexey Proskuryakov
Comment 43 2011-09-22 12:43:37 PDT
Comment on attachment 108242 [details] Remove didReceiveAuthenticationChallenge() - rename enum values r=me. I didn't review very closely this time, but looks like all comments were addressed.
Nate Chapin
Comment 44 2011-09-22 12:47:10 PDT
Comment on attachment 108242 [details] Remove didReceiveAuthenticationChallenge() - rename enum values Thanks!
WebKit Review Bot
Comment 45 2011-09-22 18:11:47 PDT
Comment on attachment 108242 [details] Remove didReceiveAuthenticationChallenge() - rename enum values Clearing flags on attachment: 108242 Committed r95768: <http://trac.webkit.org/changeset/95768>
WebKit Review Bot
Comment 46 2011-09-22 18:11:54 PDT
All reviewed patches have been landed. Closing bug.
Note You need to log in before you can comment on or make changes to this bug.