Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(245)

Side by Side Diff: third_party/WebKit/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-script-in-iframe-expected.txt

Issue 1931063004: Stop blocking 'http://127.0.0.1/' as mixed content. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Ugh. Created 4 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 CONSOLE WARNING: Mixed Content: The page at 'https://127.0.0.1:8443/security/mix edContent/resources/frame-with-redirect-http-to-https-script.html' was loaded ov er HTTPS, but requested an insecure script 'http://127.0.0.1:8080/security/resou rces/redir.php?url=https://127.0.0.1:8443/security/mixedContent/resources/script .js'. This content should also be served over HTTPS. 1 CONSOLE WARNING: Mixed Content: The page at 'https://127.0.0.1:8443/security/mix edContent/resources/frame-with-redirect-http-to-https-script.html' was loaded ov er HTTPS, but requested an insecure script 'http://example.test:8080/security/re sources/redir.php?url=https://127.0.0.1:8443/security/mixedContent/resources/scr ipt.js'. This content should also be served over HTTPS.
2 This test loads a secure iframe that loads an insecure script (but with a tricky redirect). We should trigger a mixed content callback because an active network attacker could have redirected the script load to https://attacker.com. 2 This test loads a secure iframe that loads an insecure script (but with a tricky redirect). We should trigger a mixed content callback because an active network attacker could have redirected the script load to https://attacker.com.
3 3
4 4
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698