| Index: LayoutTests/http/tests/security/mixedContent/insecure-formSubmission-in-main-frame-blocked.html
|
| diff --git a/LayoutTests/http/tests/security/mixedContent/insecure-formSubmission-in-main-frame-blocked.html b/LayoutTests/http/tests/security/mixedContent/insecure-formSubmission-in-main-frame-blocked.html
|
| deleted file mode 100644
|
| index 7a469e8022c7dda95dfa92d8136380c067a2f7a1..0000000000000000000000000000000000000000
|
| --- a/LayoutTests/http/tests/security/mixedContent/insecure-formSubmission-in-main-frame-blocked.html
|
| +++ /dev/null
|
| @@ -1,24 +0,0 @@
|
| -<html>
|
| -<body>
|
| -<script>
|
| -if (window.testRunner) {
|
| - testRunner.waitUntilDone();
|
| - testRunner.dumpAsText();
|
| - testRunner.setCanOpenWindows();
|
| - testRunner.setCloseRemainingWindowsWhenComplete(true);
|
| - testRunner.overridePreference("WebKitAllowDisplayingInsecureContent", false);
|
| -}
|
| -
|
| -window.addEventListener("message", function (e) {
|
| - if (window.testRunner)
|
| - testRunner.notifyDone();
|
| -}, false);
|
| -
|
| -</script>
|
| -<p>This test opens a window that shows a form with "action" pointing to an insecure
|
| -location. We should not trigger a mixed content callback even though the main frame in the window is HTTPS and the form is pointing to insecure content, because we've set the preference to block this.</p>
|
| -<script>
|
| -window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-insecure-formSubmission.html");
|
| -</script>
|
| -</body>
|
| -</html>
|
|
|