| Index: LayoutTests/http/tests/security/mixedContent/insecure-css-image-with-reload.html
|
| diff --git a/LayoutTests/http/tests/security/mixedContent/insecure-css-image-with-reload.html b/LayoutTests/http/tests/security/mixedContent/insecure-css-image-with-reload.html
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..e73f2e531dc9820f98274f9b2dd8216694624f87
|
| --- /dev/null
|
| +++ b/LayoutTests/http/tests/security/mixedContent/insecure-css-image-with-reload.html
|
| @@ -0,0 +1,17 @@
|
| +<html>
|
| +<body>
|
| +<p>This test opens a window that loads a frame with a subframe which contains
|
| +insecure css image. The subframe is refreshed after it loads. We should trigger
|
| +a mixed content callback twice despite the fact that on a second load of the
|
| +subframe a css cache might be used to fetch an image.</p>
|
| +<script>
|
| +if (window.testRunner) {
|
| + testRunner.waitUntilDone();
|
| + testRunner.dumpAsText();
|
| + testRunner.setCanOpenWindows();
|
| + testRunner.setCloseRemainingWindowsWhenComplete(true);
|
| +}
|
| +window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-subframe-and-reload.html");
|
| +</script>
|
| +</body>
|
| +</html>
|
|
|