OLD | NEW |
1 <html> | 1 <html> |
2 <body> | 2 <body> |
3 <script> | 3 <script> |
4 if (window.testRunner) | 4 if (window.testRunner) { |
5 testRunner.dumpAsText(); | 5 testRunner.dumpAsText(); |
| 6 testRunner.overridePreference("WebKitAllowRunningInsecureContent", true); |
| 7 } |
6 </script> | 8 </script> |
7 <p>This test loads a secure iframe that loads an insecure script (but with a | 9 <p>This test loads a secure iframe that loads an insecure script (but with a |
8 tricky redirect). We should trigger a mixed content callback because an active | 10 tricky redirect). We should trigger a mixed content callback because an active |
9 network attacker could have redirected the script load to | 11 network attacker could have redirected the script load to |
10 https://attacker.com.</p> | 12 https://attacker.com.</p> |
11 <iframe src="https://127.0.0.1:8443/security/mixedContent/resources/frame-with-r
edirect-http-to-https-script.html"; | 13 <iframe src="https://127.0.0.1:8443/security/mixedContent/resources/frame-with-r
edirect-http-to-https-script.html"; |
12 ></iframe> | 14 ></iframe> |
13 </body> | 15 </body> |
14 </html> | 16 </html> |
OLD | NEW |