| Summary: | REGRESSION (r284650-284661): [iOS15 Sim] imported/w3c/web-platform-tests/content-security-policy/script-src/script-src-multiple-policies-multiple-hashing-algorithms.html is a text failure | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Product: | WebKit | Reporter: | Eric Hutchison <ehutchison> | ||||||
| Component: | New Bugs | Assignee: | Kate Cheney <katherine_cheney> | ||||||
| Status: | RESOLVED FIXED | ||||||||
| Severity: | Normal | CC: | bfulgham, ehutchison, ews-watchlist, katherine_cheney, mkwst, webkit-bot-watchers-bugzilla, webkit-bug-importer | ||||||
| Priority: | P2 | Keywords: | InRadar | ||||||
| Version: | WebKit Nightly Build | ||||||||
| Hardware: | Unspecified | ||||||||
| OS: | Unspecified | ||||||||
| Attachments: |
|
||||||||
|
Description
Eric Hutchison
2021-10-21 17:28:02 PDT
Updated test expectations at https://trac.webkit.org/changeset/284659/webkit Test history shows that this isn't just EWS, but a very recent trunk regression.
> Unable to locally reproduce the text failure.
Which revision were you attempting to reproduce with?
LayoutTests/TestExpectations:5154:imported/w3c/web-platform-tests/content-security-policy/script-src/ [ DumpJSConsoleLogInStdErr ] The flaky expectation added in r284659 is overriding this and causing the test to show up as a consistent failure now. (In reply to Ryan Haddad from comment #4) > LayoutTests/TestExpectations:5154:imported/w3c/web-platform-tests/content- > security-policy/script-src/ [ DumpJSConsoleLogInStdErr ] > > The flaky expectation added in r284659 is overriding this and causing the > test to show up as a consistent failure now. Add expectation: https://trac.webkit.org/changeset/284708/webkit Created attachment 442616 [details]
Patch
Comment on attachment 442616 [details] Patch View in context: https://bugs.webkit.org/attachment.cgi?id=442616&action=review r=me > Source/WebCore/page/csp/ContentSecurityPolicy.cpp:374 > + Vector<ContentSecurityPolicyHash> hashes; If we might have many hashes, we could preallocate hashes for the size of algorithms, but maybe we only ever have a handful. > Source/WebCore/page/csp/ContentSecurityPolicy.cpp:376 > ContentSecurityPolicyHash hash = cryptographicDigestForBytes(algorithm, encodedContent.data(), encodedContent.size()); This could be auto (In reply to Brent Fulgham from comment #7) > Comment on attachment 442616 [details] > Patch > > View in context: > https://bugs.webkit.org/attachment.cgi?id=442616&action=review > > r=me > Thanks! Going to wait for EWS before landing, in case I missed any failing tests locally. > > Source/WebCore/page/csp/ContentSecurityPolicy.cpp:374 > > + Vector<ContentSecurityPolicyHash> hashes; > > If we might have many hashes, we could preallocate hashes for the size of > algorithms, but maybe we only ever have a handful. > We will only ever have 3 at most because only sha256, sha384, and sha512 are supported. So, probably not too much of an efficiency boost, but I will change it if you think it is important. > > Source/WebCore/page/csp/ContentSecurityPolicy.cpp:376 > > ContentSecurityPolicyHash hash = cryptographicDigestForBytes(algorithm, encodedContent.data(), encodedContent.size()); > > This could be auto Will fix. Created attachment 442626 [details]
Patch for landing
Committed r284959 (243611@main): <https://commits.webkit.org/243611@main> All reviewed patches have been landed. Closing bug and clearing flags on attachment 442626 [details]. |