Index: third_party/WebKit/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-script-in-iframe-expected.txt |
diff --git a/third_party/WebKit/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-script-in-iframe-expected.txt b/third_party/WebKit/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-script-in-iframe-expected.txt |
index 7cec32637177e41e0f911c1c2a73180556610bc1..180d89b4b7f1ebfed11f4003a06af4ce66bf0182 100644 |
--- a/third_party/WebKit/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-script-in-iframe-expected.txt |
+++ b/third_party/WebKit/LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-script-in-iframe-expected.txt |
@@ -1,4 +1,4 @@ |
-CONSOLE WARNING: Mixed Content: The page at 'https://127.0.0.1:8443/security/mixedContent/resources/frame-with-redirect-http-to-https-script.html' was loaded over HTTPS, but requested an insecure script 'http://127.0.0.1:8080/security/resources/redir.php?url=https://127.0.0.1:8443/security/mixedContent/resources/script.js'. This content should also be served over HTTPS. |
+CONSOLE WARNING: Mixed Content: The page at 'https://127.0.0.1:8443/security/mixedContent/resources/frame-with-redirect-http-to-https-script.html' was loaded over HTTPS, but requested an insecure script 'http://example.test:8080/security/resources/redir.php?url=https://127.0.0.1:8443/security/mixedContent/resources/script.js'. This content should also be served over HTTPS. |
This test loads a secure iframe that loads an insecure script (but with a tricky redirect). We should trigger a mixed content callback because an active network attacker could have redirected the script load to https://attacker.com. |