Bug 314240

Summary: [Site Isolation] http/tests/security/mixedContent/insecure-css-with-secure-cookies-UpgradeMixedContent.html is flaky on macOS Site Isolation post-commit
Product: WebKit Reporter: Anthony Tarbinian <a.tarbinian>
Component: New BugsAssignee: Nobody <webkit-unassigned>
Status: RESOLVED FIXED    
Severity: Normal CC: webkit-bug-importer
Priority: P2 Keywords: InRadar
Version: WebKit Nightly Build   
Hardware: Unspecified   
OS: Unspecified   

Anthony Tarbinian
Reported 2026-05-06 14:25:28 PDT
The test is failing flakily with the following diff on macOS post-commit bots ``` --- /Volumes/Data/worker/Apple-Tahoe-Release-WK2-Site-Isolation-Tree-Tests/build/layout-test-results/http/tests/security/mixedContent/insecure-css-with-secure-cookies-UpgradeMixedContent-expected.txt +++ /Volumes/Data/worker/Apple-Tahoe-Release-WK2-Site-Isolation-Tree-Tests/build/layout-test-results/http/tests/security/mixedContent/insecure-css-with-secure-cookies-UpgradeMixedContent-actual.txt @@ -1,4 +1,2 @@ CONSOLE MESSAGE: secureCookie=yes -CONSOLE MESSAGE: The page at https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-css-secure-cookies.html requested insecure content from http://127.0.0.1:8080/security/resources/greenbox-hotspot5-4.cur. This content was automatically upgraded and should be served over HTTPS. - This test opens a window that loads a secure style sheet with insecure cursor content after reading secure cookies. This should be allowed because loading of the insecure cursor does not pose a security risk since it can only affect the display. ```
Attachments
Radar WebKit Bug Importer
Comment 1 2026-05-06 14:25:34 PDT
Anthony Tarbinian
Comment 2 2026-05-06 14:39:56 PDT
EWS
Comment 3 2026-05-06 16:02:39 PDT
Committed 312746@main (a3d8b660f640): <https://commits.webkit.org/312746@main> Reviewed commits have been landed. Closing PR #64396 and removing active labels.
Note You need to log in before you can comment on or make changes to this bug.