WebKit Bugzilla
New
Browse
Log In
×
Sign in with GitHub
or
Remember my login
Create Account
·
Forgot Password
Forgotten password account recovery
RESOLVED FIXED
65330
Remove auth-related functions from SubresourceLoaderClient
https://bugs.webkit.org/show_bug.cgi?id=65330
Summary
Remove auth-related functions from SubresourceLoaderClient
Nate Chapin
Reported
2011-07-28 11:34:51 PDT
It appears that getShouldUseCredentialStorage(), didReceiveAuthenticationChallenge() and receivedCancellation() don't actually do much (in the various SubresourceLoaderClients). The code would probably be simpler if we pushed the little bit of logic in the clients down into SubresourceLoader and got rid of these callbacks. It would also make efforts like
https://bugs.webkit.org/show_bug.cgi?id=61225
easier by reducing the number of callbacks that need to be rewired. Patch shortly.
Attachments
patch
(24.15 KB, patch)
2011-07-28 11:38 PDT
,
Nate Chapin
no flags
Details
Formatted Diff
Diff
Remove getShouldUseCredentialStorage()
(5.68 KB, patch)
2011-08-04 13:30 PDT
,
Nate Chapin
no flags
Details
Formatted Diff
Diff
Remove didReceiveAuthenticationChallenge()
(5.68 KB, patch)
2011-08-04 14:58 PDT
,
Nate Chapin
no flags
Details
Formatted Diff
Diff
Remove didReceiveAuthenticationChallenge()
(15.21 KB, patch)
2011-08-04 15:22 PDT
,
Nate Chapin
no flags
Details
Formatted Diff
Diff
Remove receivedCancellation()
(10.56 KB, patch)
2011-08-05 09:28 PDT
,
Nate Chapin
no flags
Details
Formatted Diff
Diff
Remove receivedCancellation() - with better ChangeLog
(10.97 KB, patch)
2011-08-08 16:53 PDT
,
Nate Chapin
no flags
Details
Formatted Diff
Diff
Remove getShouldUseCredentialStorage() - with more ChangeLog
(5.82 KB, patch)
2011-08-17 10:22 PDT
,
Nate Chapin
no flags
Details
Formatted Diff
Diff
Remove didReceiveAuthenticationChallenge() - more ChangeLog
(15.32 KB, patch)
2011-08-17 11:16 PDT
,
Nate Chapin
ap
: review-
ap
: commit-queue-
Details
Formatted Diff
Diff
Remove didReceiveAuthenticationChallenge() #3
(15.46 KB, patch)
2011-08-22 13:28 PDT
,
Nate Chapin
no flags
Details
Formatted Diff
Diff
Remove getShouldUseCredentialStorage() without the allowCookies() check
(11.95 KB, patch)
2011-08-26 14:42 PDT
,
Nate Chapin
no flags
Details
Formatted Diff
Diff
Remove didReceiveAuthenticationChallenge() #4
(18.03 KB, patch)
2011-08-30 11:09 PDT
,
Nate Chapin
no flags
Details
Formatted Diff
Diff
Remove didReceiveAuthenticationChallenge() - minus style issue
(18.09 KB, patch)
2011-08-30 12:11 PDT
,
Nate Chapin
no flags
Details
Formatted Diff
Diff
Remove didReceiveAuthenticationChallenge() - rename enum values
(18.00 KB, patch)
2011-09-21 15:03 PDT
,
Nate Chapin
no flags
Details
Formatted Diff
Diff
Show Obsolete
(12)
View All
Add attachment
proposed patch, testcase, etc.
Nate Chapin
Comment 1
2011-07-28 11:38:45 PDT
Created
attachment 102275
[details]
patch All the LayoutTests still pass, and I've done a little bit of manual browsing with the patch (I plan on doing some more). If there's something in particular I should be testing manually, suggestions are appreciated.
Adam Barth
Comment 2
2011-07-28 11:56:27 PDT
This looks like a good change. I'm going to give other folks a chance to comment though.
Alexey Proskuryakov
Comment 3
2011-07-28 11:57:53 PDT
I'm on vacation now, but would like to take a close look next week. I vaguely recall that getShouldUseCredentialStorage() in particular is supposed to be filtered down to WebKit client.
Nate Chapin
Comment 4
2011-07-28 12:02:36 PDT
(In reply to
comment #3
)
> I'm on vacation now, but would like to take a close look next week. > > I vaguely recall that getShouldUseCredentialStorage() in particular is supposed to be filtered down to WebKit client.
If I changed any of the calls back to the WebKit client, it's a bug. :) This should only change calls that are made to DocumentThreadableLoader (and therefore the ThreadableLoaderClients) and IconLoader.
Alexey Proskuryakov
Comment 5
2011-08-01 17:03:52 PDT
Comment on
attachment 102275
[details]
patch View in context:
https://bugs.webkit.org/attachment.cgi?id=102275&action=review
I like the direction of this patch. I didn't review it in a lot of detail yet, because I had some general comments that I think you may want to address first. FrameLoaderClient calls are made from ResourceLoader, which is why changing SubresourceLoader shouldn't affect them indeed - we just need to make sure that we fall through to ResourceLoader in all the same cases.
> Source/WebCore/loader/ResourceLoader.cpp:524 > + if (!m_request.allowCookies()) > + return false;
This is worth at least a comment explaining why we tie cookies and HTTP credentials together like this.
> Source/WebCore/loader/ResourceLoader.cpp:559 > + didReceiveResponse(challenge.failureResponse());
In XMLHttpRequest case at least, this will change when InspectorInstrumentation is notified. Is that an improvement? For MainResourceLoader, this changes a lot of code that runs in this case. Why is that OK? The changes that went to ResourceLoader particularly worry me, because the patch is supposed to only affect subresources. Perhaps this would be easier to review if there were three patches, one for each SubresourceLoaderClient method that's being removed. It's rather difficult for me to follow every code path, given that this patch actually changes what code is being run.
> Source/WebCore/loader/SubresourceLoader.cpp:254 > + // Only these platforms provide a way to continue without credentials, and users shouldn't be prompted > + // for credentials on a cross-origin request. Fall through and cancel for other platfroms.
Typo: platfroms.
> Source/WebCore/loader/SubresourceLoader.cpp:261 > + case AuthenticateNever: > + cancel();
It's a mystery why we'd try to continue without credentials in AuthenticateSameOrigin, but not in AuthenticateNever. Another subtlety is when it's OK to use stored session credentials, and when it's OK to ask a user for credentials. These are separate questions, but the AuthenticateWhen naming scheme doesn't differentiate between the two. I think that for this change to really be an improvement, SubresourceLoader options should be direct and straightforward, without traps like these.
> Source/WebCore/loader/SubresourceLoader.cpp:264 > + default: > + ASSERT_NOT_REACHED();
Is there a specific reason to add this default clause? It prevents the compiler from generating an error if some cases are not handled.
Nate Chapin
Comment 6
2011-08-04 12:03:36 PDT
r/SubresourceLoader.cpp:261
> > + case AuthenticateNever: > > + cancel(); > > It's a mystery why we'd try to continue without credentials in AuthenticateSameOrigin, but not in AuthenticateNever. > > Another subtlety is when it's OK to use stored session credentials, and when it's OK to ask a user for credentials. These are separate questions, but the AuthenticateWhen naming scheme doesn't differentiate between the two.
If I'm reading this correctly, it appears ResourceHandle calls ResourceLoader::shouldUseCredentialStorage() and uses credential storage first, and only calls ResourceLoader::didReceiveAuthenticationChallenge() if stored credentials are no longer an option.
Alexey Proskuryakov
Comment 7
2011-08-04 12:10:16 PDT
That suggest that better names could be something like NeverAskUserForCredentials instead of AuthenticateNever.
Nate Chapin
Comment 8
2011-08-04 12:22:25 PDT
(In reply to
comment #7
)
> That suggest that better names could be something like NeverAskUserForCredentials instead of AuthenticateNever.
Good point, I'll rename that stuff. I think I'll follow your other suggestion and split this into a separate patch for each function, too.
Nate Chapin
Comment 9
2011-08-04 13:30:09 PDT
Created
attachment 102970
[details]
Remove getShouldUseCredentialStorage() I gave my best shot at explaining the logic for the allowCookies() check in ResourceLoader::shouldUseCredentialStorage(), let me know if I said something stupid :)
Nate Chapin
Comment 10
2011-08-04 14:58:08 PDT
Created
attachment 102985
[details]
Remove didReceiveAuthenticationChallenge()
Nate Chapin
Comment 11
2011-08-04 15:22:22 PDT
Created
attachment 102990
[details]
Remove didReceiveAuthenticationChallenge() Oops, uploaded the same patch twice.
Nate Chapin
Comment 12
2011-08-05 09:28:34 PDT
Created
attachment 103077
[details]
Remove receivedCancellation() After some more studying, it appears receivedCancellation() doesn't actually do anything in any SubresourceLoaderClient. Keep in mind that it's always followed by a didFail() because ResourceLoader::receivedCancellation() cancels the load. didFail() and receivedCancellation() do the same thing in both WorkerScriptLoader and Notification. In XMLHttpRequest, receivedCancellation() just sets m_response, and didFail() clears m_response before using it in any way.
Alexey Proskuryakov
Comment 13
2011-08-08 15:20:27 PDT
Comment on
attachment 103077
[details]
Remove receivedCancellation() Let's start with this patch, as it seems to be the simplest one. It is subtle however, because not every browser UI provides a way for the user to cancel an authentication dialog. However, clients may pick either behavior (cancel request altogether or continue without credentials and use whatever data comes with 401 response). Can you explain in ChangeLog why it's OK to make the change for each of the modified files? I'm particularly unsure about XMLHttpRequest - who will set m_response if didReceiveAuthenticationCancellation does not? Or how will WorkerScriptLoader know that it's in error state?
Nate Chapin
Comment 14
2011-08-08 15:23:28 PDT
(In reply to
comment #13
)
> (From update of
attachment 103077
[details]
) > Let's start with this patch, as it seems to be the simplest one. It is subtle however, because not every browser UI provides a way for the user to cancel an authentication dialog. However, clients may pick either behavior (cancel request altogether or continue without credentials and use whatever data comes with 401 response). > > Can you explain in ChangeLog why it's OK to make the change for each of the modified files? I'm particularly unsure about XMLHttpRequest - who will set m_response if didReceiveAuthenticationCancellation does not? Or how will WorkerScriptLoader know that it's in error state?
Will do. I'll essentially be rewording
comment #12
. :)
Alexey Proskuryakov
Comment 15
2011-08-08 16:41:35 PDT
> I'll essentially be rewording
comment #12
. :)
I did overlook that comment indeed. Let's get it into ChangeLog though.
Nate Chapin
Comment 16
2011-08-08 16:53:37 PDT
Created
attachment 103316
[details]
Remove receivedCancellation() - with better ChangeLog
Alexey Proskuryakov
Comment 17
2011-08-09 10:19:09 PDT
Comment on
attachment 103316
[details]
Remove receivedCancellation() - with better ChangeLog View in context:
https://bugs.webkit.org/attachment.cgi?id=103316&action=review
> Source/WebCore/ChangeLog:9 > + Remove receivedCancellation() from SubresourceLoaderClient. > + It's a no-op because it's always immediately followed by a > + canceallation (ResourceLoader::receivedCancellation() calls > + cancel(), which leads to calling SubresourceLoaderClinet::didFail()). > + For WorkerScriptLoader and Notification, receivedCancellation() > + and didFail() are identical. For XMLHttpRequest, receivedCancellation() > + sets m_response, which didFail() clears before it can be used.
Please don't put explanations into ChangeLog like this. There is an automatically generated list of files below. Simply listing modified files and functions is not very helpful, and the reason for the script to add it is that contributors will use it as a starting point.
> Source/WebCore/xml/XMLHttpRequest.cpp:-1054 > -void XMLHttpRequest::didReceiveAuthenticationCancellation(unsigned long, const ResourceResponse& failureResponse) > -{ > - m_response = failureResponse; > -}
This code was added in <
http://trac.webkit.org/changeset/24862
> without a regression test. But it does seem fine to remove it now - WebKit (at least ports that I checked) no longer does a cancellation when the user cancels an authentication sheet. It now asks WebKit to continue without credentials.
Nate Chapin
Comment 18
2011-08-09 12:40:39 PDT
Comment on
attachment 103316
[details]
Remove receivedCancellation() - with better ChangeLog receivedCancellation() removal landed:
http://trac.webkit.org/changeset/92691
Alexey Proskuryakov
Comment 19
2011-08-16 16:47:48 PDT
Would you be willing to annotate ChangeLogs of the remaining patches with equally good explanations?
Nate Chapin
Comment 20
2011-08-17 08:34:22 PDT
(In reply to
comment #19
)
> Would you be willing to annotate ChangeLogs of the remaining patches with equally good explanations?
Sure. Will remove r? from the existing patches in the interim.
Nate Chapin
Comment 21
2011-08-17 10:22:44 PDT
Created
attachment 104190
[details]
Remove getShouldUseCredentialStorage() - with more ChangeLog Hopefully the changelog + comment in ResourceLoader.cpp covers this patch sufficiently.
WebKit Review Bot
Comment 22
2011-08-17 10:25:02 PDT
Attachment 104190
[details]
did not pass style-queue: Failed to run "['Tools/Scripts/check-webkit-style', '--diff-files', u'Source/WebCore/ChangeLog', u'Source/WebCor..." exit_code: 1 Source/WebCore/ChangeLog:1: ChangeLog entry has no bug number [changelog/bugnumber] [5] Total errors found: 1 in 2 files If any of these errors are false positives, please file a bug against check-webkit-style.
Nate Chapin
Comment 23
2011-08-17 11:16:35 PDT
Created
attachment 104198
[details]
Remove didReceiveAuthenticationChallenge() - more ChangeLog
Alexey Proskuryakov
Comment 24
2011-08-17 12:32:52 PDT
Comment on
attachment 104198
[details]
Remove didReceiveAuthenticationChallenge() - more ChangeLog View in context:
https://bugs.webkit.org/attachment.cgi?id=104198&action=review
Thanks, the split patch is so much easier to review. Seems like this has a few rough edges, but looks like a nice improvement overall. One challenge is that existing cross origin policies are incorrect in that they are too limiting. When a cross-origin XMLHttpRequest is redirected, we should actually perform a new preflight, and not just bail out (not quite sure if we're allowed to ask the user for credentials after the redirect though). We might actually need to call into DocumentThreadableLoader, and in this sense, this patch could be a step in a wrong direction. Perhaps it's OK to make this step back to make existing code clearer, and think about implementing CORS redirects when we come to that.
> Source/WebCore/ChangeLog:6 > + Note that this only
Please, more, more ChangeLog!
> Source/WebCore/loader/FrameLoaderTypes.h:127 > + enum UserCredentialPolicy {
Despite what I said before, this is about asking the client, which will not necessarily ask the user.
> Source/WebCore/loader/FrameLoaderTypes.h:130 > + AskUserForCredentialsAlways, > + AskUserForCredentialsSameOrigin, > + AskUserForCredentialsNever
The enum values would benefit from being better formed grammatically (AskUserForCredentialsNever vs. NeverAskUserForCredentials). For AskUserForCredentialsSameOrigin in particular, I can't tell what this option does from looking at its name. Is it really AskUserForCredentialsUnlessRedirectedCrossOrigin? Or if it's about cross-origin requests, why can't we decide that upfront and pass AskUserForCredentialsNever?
> Source/WebCore/loader/SubresourceLoader.cpp:260 > + if (m_frame->document()->securityOrigin()->canRequest(request().url()))
This check doesn't seem to match what we had before. We looked at DocumentThreadableLoader::m_sameOriginRequest, which is set in constructor, while request() changes with every redirect. IIRC DocumentThreadableLoader just prevents cross origin redirects now (which is not correct according to the CORS spec), but you don't want to rely on the fact that DocumentThreadableLoader is the only client that passes AskUserForCredentialsSameOrigin.
> Source/WebCore/loader/SubresourceLoader.cpp:269 > +#if PLATFORM(MAC) || USE(CFNETWORK) || USE(CURL) > + handle()->receivedRequestToContinueWithoutCredential(challenge); > +#endif > + if (handle()->hasAuthenticationChallenge()) > + cancel();
Old code also called didFail with blockedError. Why is that not needed? ChangeLog doesn't say.
Nate Chapin
Comment 25
2011-08-18 15:49:46 PDT
> One challenge is that existing cross origin policies are incorrect in that they are too limiting. When a cross-origin XMLHttpRequest is redirected, we should actually perform a new preflight, and not just bail out (not quite sure if we're allowed to ask the user for credentials after the redirect though). We might actually need to call into DocumentThreadableLoader, and in this sense, this patch could be a step in a wrong direction. Perhaps it's OK to make this step back to make existing code clearer, and think about implementing CORS redirects when we come to that.
I'm sort of inclined to punt on this issue until we get around to dealing with CORS redirects, but I'm going to think about it some more before uploading a new patch.
> > > Source/WebCore/ChangeLog:6 > > + Note that this only > > Please, more, more ChangeLog!
I'll do my best :)
> > > Source/WebCore/loader/FrameLoaderTypes.h:127 > > + enum UserCredentialPolicy { > > Despite what I said before, this is about asking the client, which will not necessarily ask the user.
Hmm.....good point. ClientCredentialPolicy?
> > > Source/WebCore/loader/SubresourceLoader.cpp:260 > > + if (m_frame->document()->securityOrigin()->canRequest(request().url())) > > This check doesn't seem to match what we had before. We looked at DocumentThreadableLoader::m_sameOriginRequest, which is set in constructor, while request() changes with every redirect. IIRC DocumentThreadableLoader just prevents cross origin redirects now (which is not correct according to the CORS spec), but you don't want to rely on the fact that DocumentThreadableLoader is the only client that passes AskUserForCredentialsSameOrigin.
Good catch, that should be originalRequest() I think.
Nate Chapin
Comment 26
2011-08-22 13:28:12 PDT
Created
attachment 104727
[details]
Remove didReceiveAuthenticationChallenge() #3 Hopefully this is enough ChangeLog....not sure how I managed to leave that sentence fragment in the previous version.
Alexey Proskuryakov
Comment 27
2011-08-23 10:59:27 PDT
Comment on
attachment 104190
[details]
Remove getShouldUseCredentialStorage() - with more ChangeLog I'm feeling conflicted about this patch: 1. When looking at ResourceLoader code, it's unnatural to expect that some policy choices are overridden by a subclass. So, getting rid of that is good. 2. The weird check for m_request.allowCookies() is indeed weird. We had very clear and straightforward code in the client. I'm going to say r+, but could the real answer be to move the client call from SubresourceLoaderClient to ResourceLoaderClient, clarifying control flow in this way?
Nate Chapin
Comment 28
2011-08-24 12:49:09 PDT
(In reply to
comment #27
)
> (From update of
attachment 104190
[details]
) > I'm feeling conflicted about this patch: > 1. When looking at ResourceLoader code, it's unnatural to expect that some policy choices are overridden by a subclass. So, getting rid of that is good. > 2. The weird check for m_request.allowCookies() is indeed weird. We had very clear and straightforward code in the client. > > I'm going to say r+, but could the real answer be to move the client call from SubresourceLoaderClient to ResourceLoaderClient, clarifying control flow in this way?
We could plumb the relevant variable in ThreadableLoaderOptions (m_allowCredentials) down to SubresourceLoader? Not sure if that's better or worse.
Alexey Proskuryakov
Comment 29
2011-08-24 13:19:05 PDT
I think that this would be more straightforward than second-guessing from ResourceRequest's idea of whether to send cookies.
Nate Chapin
Comment 30
2011-08-24 16:45:23 PDT
(In reply to
comment #29
)
> I think that this would be more straightforward than second-guessing from ResourceRequest's idea of whether to send cookies.
I revived
https://bugs.webkit.org/show_bug.cgi?id=63301
in the hope of making passing these sorts of parameters more sane than a long string of bools.
Nate Chapin
Comment 31
2011-08-26 14:42:18 PDT
Created
attachment 105410
[details]
Remove getShouldUseCredentialStorage() without the allowCookies() check
Alexey Proskuryakov
Comment 32
2011-08-26 15:24:54 PDT
Comment on
attachment 105410
[details]
Remove getShouldUseCredentialStorage() without the allowCookies() check Nice!
WebKit Review Bot
Comment 33
2011-08-26 16:32:11 PDT
Comment on
attachment 105410
[details]
Remove getShouldUseCredentialStorage() without the allowCookies() check Clearing flags on attachment: 105410 Committed
r93923
: <
http://trac.webkit.org/changeset/93923
>
Alexey Proskuryakov
Comment 34
2011-08-26 16:57:18 PDT
Comment on
attachment 104727
[details]
Remove didReceiveAuthenticationChallenge() #3 View in context:
https://bugs.webkit.org/attachment.cgi?id=104727&action=review
Some comments for discussion below.
> Source/WebCore/ChangeLog:21 > + (WebCore::SubresourceLoader::didReceiveAuthenticationChallenge): Handle the authentication
The good thing about two previous patches was that SubresourceLoader override was completely removed, making the logic much easier to follow. This is not the case here, so I'm not sure if the change is beneficial.
> Source/WebCore/loader/cache/CachedResourceRequest.cpp:128 > + request.get(), resourceRequest, AlwaysAskClientForCredentials, priority, securityCheck, sendResourceLoadCallbacks);
I wonder how important it is to show credentials dialog when a cross-origin subresource or subframe wants it. It's certainly confusing and dangerous. Definitely not something to change in this patch.
> Source/WebCore/loader/icon/IconLoader.cpp:-131 > - m_resourceLoader->cancel();
This patch changes behavior for IconLoader in a way that's not mentioned in ChangeLog. We use to always cancel such requests, but now we attempt to continue without credentials.
> Source/WebCore/loader/SubresourceLoader.cpp:269 > +#if PLATFORM(MAC) || USE(CFNETWORK) || USE(CURL) > + handle()->receivedRequestToContinueWithoutCredential(challenge); > +#endif > + if (handle()->hasAuthenticationChallenge()) > + didFail(blockedError());
I would add a comment explaining that receivedRequestToContinueWithoutCredential will normally clear the challenge. Or it might be even better to put the other case in #else, so that no one could get confused as to whether we do didFail() after receivedRequestToContinueWithoutCredential(). There is a comment above the part I quoted, but it's fairly indirect. Also, we used to have a cancel() call after didFail() in DocumentThreadableLoader::didReceiveAuthenticationChallenge, and IconLoader also performed a cancel(). Why is this OK to change?
> Source/WebCore/loader/DocumentThreadableLoader.cpp:346 > + m_loader = resourceLoadScheduler()->scheduleSubresourceLoad(m_document->frame(), this, request, OnlyAskClientForCredentialsForSameOrigin, ResourceLoadPriorityMedium, securityCheck, sendLoadCallbacks,
It would be good to have a FIXME comment, explaining how OnlyAskClientForCredentialsForSameOrigin is not a proper policy. But it may be difficult to write - I certainly cannot do that without consulting relevant specs.
Nate Chapin
Comment 35
2011-08-29 13:44:58 PDT
> The good thing about two previous patches was that SubresourceLoader override was completely removed, making the logic much easier to follow. This is not the case here, so I'm not sure if the change is beneficial.
I was thinking about re-writing this patch to pass the policy via ResourceLoaderOptions, which would enable us to move all the login into ResourceLoader very easily. I'd need to figure out how to handle the similar between the StoredCredential policy and the new ClientCredentialPolicy, but it seems like it would still be cleaner.
Nate Chapin
Comment 36
2011-08-30 11:09:39 PDT
Created
attachment 105654
[details]
Remove didReceiveAuthenticationChallenge() #4
WebKit Review Bot
Comment 37
2011-08-30 11:11:20 PDT
Attachment 105654
[details]
did not pass style-queue: Failed to run "['Tools/Scripts/check-webkit-style', '--diff-files', u'Source/WebCore/ChangeLog', u'Source/WebCor..." exit_code: 1 Source/WebCore/ChangeLog:1: ChangeLog entry has no bug number [changelog/bugnumber] [5] Total errors found: 1 in 11 files If any of these errors are false positives, please file a bug against check-webkit-style.
Nate Chapin
Comment 38
2011-08-30 12:11:47 PDT
Created
attachment 105664
[details]
Remove didReceiveAuthenticationChallenge() - minus style issue
Eric Seidel (no email)
Comment 39
2011-09-06 15:29:05 PDT
Comment on
attachment 103316
[details]
Remove receivedCancellation() - with better ChangeLog Cleared Alexey Proskuryakov's review+ from obsolete
attachment 103316
[details]
so that this bug does not appear in
http://webkit.org/pending-commit
.
Eric Seidel (no email)
Comment 40
2011-09-06 15:29:09 PDT
Comment on
attachment 104190
[details]
Remove getShouldUseCredentialStorage() - with more ChangeLog Cleared Alexey Proskuryakov's review+ from obsolete
attachment 104190
[details]
so that this bug does not appear in
http://webkit.org/pending-commit
.
Alexey Proskuryakov
Comment 41
2011-09-06 15:41:09 PDT
Comment on
attachment 105664
[details]
Remove didReceiveAuthenticationChallenge() - minus style issue View in context:
https://bugs.webkit.org/attachment.cgi?id=105664&action=review
> Source/WebCore/loader/ResourceLoaderOptions.h:66 > + { }
These braces should be on separate lines now.
> Source/WebCore/loader/ResourceLoaderOptions.h:71 > + ClientCrossOriginCredentialPolicy crossOriginCredentialPolicy; // Whether we will ask the client for credentials (if we allow credentials at all).
This seems rather confusing. The options are AllowClientCrossOriginCredentials and BlockClientCrossOriginCredentials - I cannot easily connect those to whether we will ask the client.
Nate Chapin
Comment 42
2011-09-21 15:03:17 PDT
Created
attachment 108242
[details]
Remove didReceiveAuthenticationChallenge() - rename enum values Addressed ap's comments on previous patch. The new enum names are: AskClientForCrossOriginCredentials DoNotAskClientForCrossOriginCredentials Hopefully that's clearer.
Alexey Proskuryakov
Comment 43
2011-09-22 12:43:37 PDT
Comment on
attachment 108242
[details]
Remove didReceiveAuthenticationChallenge() - rename enum values r=me. I didn't review very closely this time, but looks like all comments were addressed.
Nate Chapin
Comment 44
2011-09-22 12:47:10 PDT
Comment on
attachment 108242
[details]
Remove didReceiveAuthenticationChallenge() - rename enum values Thanks!
WebKit Review Bot
Comment 45
2011-09-22 18:11:47 PDT
Comment on
attachment 108242
[details]
Remove didReceiveAuthenticationChallenge() - rename enum values Clearing flags on attachment: 108242 Committed
r95768
: <
http://trac.webkit.org/changeset/95768
>
WebKit Review Bot
Comment 46
2011-09-22 18:11:54 PDT
All reviewed patches have been landed. Closing bug.
Note
You need to
log in
before you can comment on or make changes to this bug.
Top of Page
Format For Printing
XML
Clone This Bug