blob: dd9899ac0b27aa51fa6ef65c706530859f4cc195 [file] [log] [blame]
<script>
if (window.testRunner) {
testRunner.dumpAsText();
testRunner.dumpChildFramesAsText();
testRunner.setHandlesAuthenticationChallenges(true);
testRunner.setAuthenticationUsername("webkit");
testRunner.setAuthenticationPassword("rocks");
testRunner.setPrivateBrowsingEnabled_DEPRECATED(true);
testRunner.waitUntilDone();
}
function firstFrameLoaded() {
if (window.testRunner) {
testRunner.setHandlesAuthenticationChallenges(false);
testRunner.setPrivateBrowsingEnabled_DEPRECATED(false);
}
// If the username and password were in the WebCore CredentialStorage, WebKit would automatically send them out for this resource.
// The credentials would be wrong, but it would send them out.
// Since the credentails that were cached from the first iframe load should have been forgotten after private browsing was disabled,
// no credentials should be sent out automatically this time.
var frame = document.createElement("iframe");
frame.setAttribute("src", "resources/auth-echo.py");
frame.setAttribute("onload", "secondFrameLoaded()");
document.body.appendChild(frame);
}
function secondFrameLoaded() {
if (window.testRunner)
testRunner.notifyDone();
}
</script>
<body>
This test makes sure that auth credentials cached during a private browsing session do not leak out after private browsing is disabled.
<iframe src="resources/basic-auth.py?username=webkit&password=rocks" onload="firstFrameLoaded();"></iframe>
</body>