Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(174)

Side by Side Diff: LayoutTests/http/tests/security/mixedContent/redirect-http-to-https-script-in-iframe-expected.txt

Issue 561153002: Mixed Content: Migrate ResourceFetcher to the static mixed content checker. (Closed) Base URL: svn://svn.chromium.org/blink/trunk
Patch Set: Fixing comment and test. Created 6 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 CONSOLE WARNING: The page at 'https://127.0.0.1:8443/security/mixedContent/resou rces/frame-with-redirect-http-to-https-script.html' was loaded over HTTPS, but r an insecure content from 'http://127.0.0.1:8080/security/resources/redir.php?url =https://127.0.0.1:8443/security/mixedContent/resources/script.js': this content should also be loaded over HTTPS. 1 CONSOLE WARNING: Mixed Content: The page at 'https://127.0.0.1:8443/security/mix edContent/resources/frame-with-redirect-http-to-https-script.html' was loaded ov er HTTPS, but requested an insecure script 'http://127.0.0.1:8080/security/resou rces/redir.php?url=https://127.0.0.1:8443/security/mixedContent/resources/script .js'. This content should also be served over HTTPS.
2
3 This test loads a secure iframe that loads an insecure script (but with a tricky redirect). We should trigger a mixed content callback because an active network attacker could have redirected the script load to https://attacker.com. 2 This test loads a secure iframe that loads an insecure script (but with a tricky redirect). We should trigger a mixed content callback because an active network attacker could have redirected the script load to https://attacker.com.
4 3
5 4
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698