| Index: third_party/WebKit/LayoutTests/http/tests/security/secureContexts/authenticated.html
|
| diff --git a/third_party/WebKit/LayoutTests/http/tests/security/secureContexts/authenticated.html b/third_party/WebKit/LayoutTests/http/tests/security/secureContexts/authenticated.html
|
| index b88da39225a5bfaf45db1401b7725bed0b1f7947..07a070f56dea644bd9c9edd4ddbc0a94d3ade6e1 100644
|
| --- a/third_party/WebKit/LayoutTests/http/tests/security/secureContexts/authenticated.html
|
| +++ b/third_party/WebKit/LayoutTests/http/tests/security/secureContexts/authenticated.html
|
| @@ -8,6 +8,9 @@
|
| </head>
|
| <body>
|
| <script>
|
| + if (window.testRunner)
|
| + testRunner.overridePreference("WebKitAllowRunningInsecureContent", true);
|
| +
|
| if (window.location.origin != get_host_info().AUTHENTICATED_ORIGIN) {
|
| window.location = get_host_info().AUTHENTICATED_ORIGIN +
|
| window.location.pathname;
|
| @@ -31,18 +34,12 @@
|
|
|
| var i1 = document.createElement("iframe");
|
| i1.src = get_host_info().UNAUTHENTICATED_ORIGIN + "/security/secureContexts/resources/post-securecontext-status.html";
|
| - // This will almost certainly be blocked by the mixed content checker, handle that case by incrementing the `messages` count.
|
| - i1.addEventListener("error", t.step_func(function (e) {
|
| - messages++;
|
| - if (messages >= 2)
|
| - t.done();
|
| - }), false);
|
| document.body.appendChild(i1);
|
|
|
| var i2 = document.createElement("iframe");
|
| i2.src = get_host_info().AUTHENTICATED_ORIGIN + "/security/secureContexts/resources/post-securecontext-status.html";
|
| document.body.appendChild(i2);
|
| - }, "Frames are either secure or insecure (and blocked by mixed content).");
|
| + }, "Frames are either secure or insecure.");
|
| }
|
| </script>
|
| </body>
|
|
|