Index: LayoutTests/http/tests/security/mixedContent/insecure-formSubmission-in-main-frame.html |
diff --git a/LayoutTests/http/tests/security/mixedContent/insecure-image-in-main-frame.html b/LayoutTests/http/tests/security/mixedContent/insecure-formSubmission-in-main-frame.html |
similarity index 61% |
copy from LayoutTests/http/tests/security/mixedContent/insecure-image-in-main-frame.html |
copy to LayoutTests/http/tests/security/mixedContent/insecure-formSubmission-in-main-frame.html |
index bb2d9f7349dc4c2a293b63be98f6d506dd44dae3..7ddc81ef6cb1d5547b0e3c9ed7fee08e1d4a693f 100644 |
--- a/LayoutTests/http/tests/security/mixedContent/insecure-image-in-main-frame.html |
+++ b/LayoutTests/http/tests/security/mixedContent/insecure-formSubmission-in-main-frame.html |
@@ -14,11 +14,11 @@ window.addEventListener("message", function (e) { |
}, false); |
</script> |
-<p>This test opens a window that loads an insecure image. We should trigger a |
-mixed content callback because the main frame in the window is HTTPS but is |
-displaying insecure content.</p> |
+<p>This test opens a window that shows a form with "action" pointing to an insecure |
+location. We should trigger a mixed content callback because the main frame |
+in the window is HTTPS but is posting to insecure location.</p> |
<script> |
-window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-image.html"); |
+window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-formSubmission.html"); |
</script> |
</body> |
</html> |