Index: third_party/WebKit/LayoutTests/http/tests/security/mixedContent/active-subresource-in-http-iframe-not-blocked.https.html |
diff --git a/third_party/WebKit/LayoutTests/http/tests/security/mixedContent/active-subresource-in-http-iframe-not-blocked.https.html b/third_party/WebKit/LayoutTests/http/tests/security/mixedContent/active-subresource-in-http-iframe-not-blocked.https.html |
new file mode 100644 |
index 0000000000000000000000000000000000000000..4e77901c067ff8658f0fbc6479fe0f99b0d813b5 |
--- /dev/null |
+++ b/third_party/WebKit/LayoutTests/http/tests/security/mixedContent/active-subresource-in-http-iframe-not-blocked.https.html |
@@ -0,0 +1,25 @@ |
+<!doctype html> |
+<html> |
+<head> |
+ <script src="/resources/testharness.js"></script> |
+ <script src="/resources/testharnessreport.js"></script> |
+ |
+ <script> |
+ if (window.testRunner) { |
+ // This test checks that active mixed subresources in iframes |
+ // are allowed if the iframe itself was allowed as mixed content. |
+ testRunner.setAllowRunningOfInsecureContent(true); |
+ testRunner.dumpAsText(); |
+ } |
+ |
+ var t = async_test("Testing an insecure script in a mixed iframe"); |
+ window.addEventListener("message", t.step_func(function () { |
+ t.done(); |
+ })); |
+ </script> |
+</head> |
+<body> |
+ <p>This test passes if the active subresource in the frame below is allowed.</p> |
+ <iframe src="http://127.0.0.1:8000/security/mixedContent/resources/frame-loads-insecure-script.html"></iframe> |
+</body> |
+</html> |