Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(240)

Side by Side Diff: LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-script-in-iframe-expected.txt

Issue 317703005: Revert of Always preload all tokens before parsing (Closed) Base URL: svn://svn.chromium.org/blink/trunk
Patch Set: Created 6 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 CONSOLE WARNING: line 1: The page at 'https://127.0.0.1:8443/security/mixedConte nt/resources/frame-with-redirect-http-to-https-script.html' was loaded over HTTP S, but ran insecure content from 'http://127.0.0.1:8080/security/resources/redir .php?url=https://127.0.0.1:8443/security/mixedContent/resources/script.js': this content should also be loaded over HTTPS.
2
3 CONSOLE WARNING: The page at 'https://127.0.0.1:8443/security/mixedContent/resou rces/frame-with-redirect-http-to-https-script.html' was loaded over HTTPS, but r an insecure content from 'http://127.0.0.1:8080/security/resources/redir.php?url =https://127.0.0.1:8443/security/mixedContent/resources/script.js': this content should also be loaded over HTTPS. 1 CONSOLE WARNING: The page at 'https://127.0.0.1:8443/security/mixedContent/resou rces/frame-with-redirect-http-to-https-script.html' was loaded over HTTPS, but r an insecure content from 'http://127.0.0.1:8080/security/resources/redir.php?url =https://127.0.0.1:8443/security/mixedContent/resources/script.js': this content should also be loaded over HTTPS.
4 2
5 This test loads a secure iframe that loads an insecure script (but with a tricky redirect). We should trigger a mixed content callback because an active network attacker could have redirected the script load to https://attacker.com. 3 This test loads a secure iframe that loads an insecure script (but with a tricky redirect). We should trigger a mixed content callback because an active network attacker could have redirected the script load to https://attacker.com.
6 4
7 5
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698