| OLD | NEW |
| (Empty) |
| 1 <html> | |
| 2 <body> | |
| 3 <script> | |
| 4 if (window.testRunner) { | |
| 5 testRunner.waitUntilDone(); | |
| 6 testRunner.dumpAsText(); | |
| 7 testRunner.setCanOpenWindows(); | |
| 8 testRunner.setCloseRemainingWindowsWhenComplete(true); | |
| 9 testRunner.overridePreference("WebKitAllowDisplayingInsecureContent", false)
; | |
| 10 } | |
| 11 | |
| 12 window.addEventListener("message", function (e) { | |
| 13 if (window.testRunner) | |
| 14 testRunner.notifyDone(); | |
| 15 }, false); | |
| 16 | |
| 17 </script> | |
| 18 <p>This test opens a window that shows a form with "action" pointing to an insec
ure | |
| 19 location. We should not trigger a mixed content callback even though the main fr
ame in the window is HTTPS and the form is pointing to insecure content, because
we've set the preference to block this.</p> | |
| 20 <script> | |
| 21 window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-i
nsecure-formSubmission.html"); | |
| 22 </script> | |
| 23 </body> | |
| 24 </html> | |
| OLD | NEW |