| Index: LayoutTests/http/tests/security/mixedContent/insecure-formSubmission-in-main-frame.html
|
| diff --git a/LayoutTests/http/tests/security/mixedContent/insecure-image-in-main-frame.html b/LayoutTests/http/tests/security/mixedContent/insecure-formSubmission-in-main-frame.html
|
| similarity index 61%
|
| copy from LayoutTests/http/tests/security/mixedContent/insecure-image-in-main-frame.html
|
| copy to LayoutTests/http/tests/security/mixedContent/insecure-formSubmission-in-main-frame.html
|
| index bb2d9f7349dc4c2a293b63be98f6d506dd44dae3..7ddc81ef6cb1d5547b0e3c9ed7fee08e1d4a693f 100644
|
| --- a/LayoutTests/http/tests/security/mixedContent/insecure-image-in-main-frame.html
|
| +++ b/LayoutTests/http/tests/security/mixedContent/insecure-formSubmission-in-main-frame.html
|
| @@ -14,11 +14,11 @@ window.addEventListener("message", function (e) {
|
| }, false);
|
|
|
| </script>
|
| -<p>This test opens a window that loads an insecure image. We should trigger a
|
| -mixed content callback because the main frame in the window is HTTPS but is
|
| -displaying insecure content.</p>
|
| +<p>This test opens a window that shows a form with "action" pointing to an insecure
|
| +location. We should trigger a mixed content callback because the main frame
|
| +in the window is HTTPS but is posting to insecure location.</p>
|
| <script>
|
| -window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-image.html");
|
| +window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-formSubmission.html");
|
| </script>
|
| </body>
|
| </html>
|
|
|