OLD | NEW |
1 <html> | 1 <html> |
2 <body> | 2 <body> |
3 <script> | 3 <script> |
4 if (window.testRunner) { | 4 if (window.testRunner) { |
5 testRunner.waitUntilDone(); | 5 testRunner.waitUntilDone(); |
6 testRunner.dumpAsText(); | 6 testRunner.dumpAsText(); |
7 testRunner.setCanOpenWindows(); | 7 testRunner.setCanOpenWindows(); |
8 testRunner.setCloseRemainingWindowsWhenComplete(true); | 8 testRunner.setCloseRemainingWindowsWhenComplete(true); |
9 testRunner.overridePreference("WebKitAllowDisplayingInsecureContent", false)
; | 9 testRunner.overridePreference("WebKitAllowDisplayingInsecureContent", false)
; |
10 } | 10 } |
| 11 if (window.internals) |
| 12 internals.settings.setLaxMixedContentCheckingEnabled(false); |
11 | 13 |
12 window.addEventListener("message", function (e) { | 14 window.addEventListener("message", function (e) { |
13 if (window.testRunner) | 15 if (window.testRunner) |
14 testRunner.notifyDone(); | 16 testRunner.notifyDone(); |
15 }, false); | 17 }, false); |
16 | 18 |
17 </script> | 19 </script> |
18 <p>This test opens a window that shows a form with "action" pointing to an insec
ure | 20 <p>This test opens a window that shows a form with "action" pointing to an insec
ure |
19 location. We should not trigger a mixed content callback even though the main fr
ame in the window is HTTPS and the form is pointing to insecure content, because
we've set the preference to block this.</p> | 21 location. We should not trigger a mixed content callback even though the main fr
ame in the window is HTTPS and the form is pointing to insecure content, because
we've set the preference to block this.</p> |
20 <script> | 22 <script> |
21 window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-i
nsecure-formSubmission.html"); | 23 window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-i
nsecure-formSubmission.html"); |
22 </script> | 24 </script> |
23 </body> | 25 </body> |
24 </html> | 26 </html> |
OLD | NEW |