OLD | NEW |
| (Empty) |
1 <html> | |
2 <body> | |
3 <script> | |
4 if (window.testRunner) { | |
5 testRunner.waitUntilDone(); | |
6 testRunner.dumpAsText(); | |
7 testRunner.setCanOpenWindows(); | |
8 testRunner.setCloseRemainingWindowsWhenComplete(true); | |
9 testRunner.overridePreference("WebKitAllowDisplayingInsecureContent", false)
; | |
10 } | |
11 | |
12 window.addEventListener("message", function (e) { | |
13 if (window.testRunner) | |
14 testRunner.notifyDone(); | |
15 }, false); | |
16 | |
17 </script> | |
18 <p>This test opens a window that shows a form with "action" pointing to an insec
ure | |
19 location. We should not trigger a mixed content callback even though the main fr
ame in the window is HTTPS and the form is pointing to insecure content, because
we've set the preference to block this.</p> | |
20 <script> | |
21 window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-i
nsecure-formSubmission.html"); | |
22 </script> | |
23 </body> | |
24 </html> | |
OLD | NEW |