Index: LayoutTests/http/tests/security/mixedContent/insecure-formSubmission-in-main-frame-allowed.html |
diff --git a/LayoutTests/http/tests/security/mixedContent/insecure-formSubmission-in-main-frame-allowed.html b/LayoutTests/http/tests/security/mixedContent/insecure-formSubmission-in-main-frame-allowed.html |
deleted file mode 100644 |
index 6929f3bddbbd0e26e9a3a1e936d0be5405c2448a..0000000000000000000000000000000000000000 |
--- a/LayoutTests/http/tests/security/mixedContent/insecure-formSubmission-in-main-frame-allowed.html |
+++ /dev/null |
@@ -1,25 +0,0 @@ |
-<html> |
-<body> |
-<script> |
-if (window.testRunner) { |
- testRunner.waitUntilDone(); |
- testRunner.dumpAsText(); |
- testRunner.setCanOpenWindows(); |
- testRunner.setCloseRemainingWindowsWhenComplete(true); |
- testRunner.overridePreference("WebKitAllowDisplayingInsecureContent", false); |
- testRunner.setAllowDisplayOfInsecureContent(true); |
-} |
- |
-window.addEventListener("message", function (e) { |
- if (window.testRunner) |
- testRunner.notifyDone(); |
-}, false); |
- |
-</script> |
-<p>This test opens a window that shows a form with "action" pointing to insecure |
-location. We should trigger a mixed content callback even though we've set the preference to block this, because we've overriden the preferences via a web permission client callback.</p> |
-<script> |
-window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-formSubmission.html"); |
-</script> |
-</body> |
-</html> |