| OLD | NEW |
| 1 <html> | 1 <html> |
| 2 <body> | 2 <body> |
| 3 <script> | 3 <script> |
| 4 if (window.testRunner) { | 4 if (window.testRunner) { |
| 5 testRunner.waitUntilDone(); | 5 testRunner.waitUntilDone(); |
| 6 testRunner.dumpAsText(); | 6 testRunner.dumpAsText(); |
| 7 testRunner.setCanOpenWindows(); | 7 testRunner.setCanOpenWindows(); |
| 8 testRunner.setCloseRemainingWindowsWhenComplete(true); | 8 testRunner.setCloseRemainingWindowsWhenComplete(true); |
| 9 testRunner.overridePreference("WebKitAllowDisplayingInsecureContent", false)
; | |
| 10 testRunner.setAllowDisplayOfInsecureContent(true); | |
| 11 } | 9 } |
| 12 | 10 |
| 13 window.addEventListener("message", function (e) { | 11 window.addEventListener("message", function (e) { |
| 14 if (window.testRunner) | 12 if (window.testRunner) |
| 15 testRunner.notifyDone(); | 13 testRunner.notifyDone(); |
| 16 }, false); | 14 }, false); |
| 17 | 15 |
| 18 </script> | 16 </script> |
| 19 <p>This test opens a window that loads an insecure image. We should trigger | 17 <p>This test opens a window that loads an insecure image. We should trigger |
| 20 a mixed content callback even though we've set the preference to block this, | 18 a mixed content callback because passive mixed content is allowed by default.</p
> |
| 21 because we've overriden the preference via a web permission client callback.</p> | |
| 22 <script> | 19 <script> |
| 23 window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-i
nsecure-image.html"); | 20 window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-i
nsecure-image.html"); |
| 24 </script> | 21 </script> |
| 25 </body> | 22 </body> |
| 26 </html> | 23 </html> |
| OLD | NEW |