blob: aaaae39c068b8975fdaa5a6adbdea3f451664b9f [file] [log] [blame]
main frame - didStartProvisionalLoadForFrame
main frame - didCommitLoadForFrame
main frame - didFinishDocumentLoadForFrame
main frame - didHandleOnloadEventsForFrame
main frame - didFinishLoadForFrame
frame "<!--frame1-->" - didStartProvisionalLoadForFrame
http://127.0.0.1:8000/loading/resources/test2/protected-resource.py - didReceiveAuthenticationChallenge - Responding with wrongusername:wrongpassword
frame "<!--frame1-->" - didCommitLoadForFrame
frame "<!--frame1-->" - didFinishDocumentLoadForFrame
frame "<!--frame1-->" - didHandleOnloadEventsForFrame
frame "<!--frame1-->" - didFinishLoadForFrame
frame "<!--frame2-->" - didStartProvisionalLoadForFrame
http://127.0.0.1:8000/loading/resources/test2/basic-auth-testing.py?username=correctusername&password=correctpassword - didReceiveAuthenticationChallenge - Responding with correctusername:correctpassword
frame "<!--frame2-->" - didCommitLoadForFrame
frame "<!--frame2-->" - didFinishDocumentLoadForFrame
frame "<!--frame2-->" - didHandleOnloadEventsForFrame
frame "<!--frame2-->" - didFinishLoadForFrame
This test makes sure that once WebCore preemptively sends out Basic credentials it thinks apply to a new resource, and that resource response with a 401 challenge, that it doesn't try to send the same wrong credentials a second time.
--------
Frame: '<!--frame1-->'
--------
Authenticated as user: wrongusername password: wrongpassword
--------
Frame: '<!--frame2-->'
--------
Authenticated as user: correctusername password: correctpassword