OLD | NEW |
1 <html> | 1 <html> |
2 <body> | 2 <body> |
3 <script> | 3 <script> |
4 if (window.testRunner) | 4 if (window.testRunner) { |
5 testRunner.dumpAsText(); | 5 testRunner.dumpAsText(); |
| 6 testRunner.overridePreference("WebKitAllowRunningInsecureContent", true); |
| 7 } |
6 </script> | 8 </script> |
7 <p>This test loads a secure iframe that loads an insecure script (but with a | 9 <p>This test loads a secure iframe that loads an insecure script (but with a |
8 tricky redirect). We should trigger a mixed content callback because an active | 10 tricky redirect). We should trigger a mixed content callback because an active |
9 network attacker can end up controling the script.</p> | 11 network attacker can end up controling the script.</p> |
10 <iframe src="https://127.0.0.1:8443/security/mixedContent/resources/frame-with-r
edirect-https-to-http-script.html"; | 12 <iframe src="https://127.0.0.1:8443/security/mixedContent/resources/frame-with-r
edirect-https-to-http-script.html"; |
11 ></iframe> | 13 ></iframe> |
12 </body> | 14 </body> |
13 </html> | 15 </html> |
OLD | NEW |