Index: LayoutTests/http/tests/security/mixedContent/insecure-css-in-iframe.html |
diff --git a/LayoutTests/http/tests/security/mixedContent/insecure-css-in-iframe.html b/LayoutTests/http/tests/security/mixedContent/insecure-css-in-iframe.html |
index 8c9a5610215fd2c4ec9b788e38d7571f7493dab6..912564a44d600481b06a62af498945e4858201b3 100644 |
--- a/LayoutTests/http/tests/security/mixedContent/insecure-css-in-iframe.html |
+++ b/LayoutTests/http/tests/security/mixedContent/insecure-css-in-iframe.html |
@@ -1,8 +1,10 @@ |
<html> |
<body> |
<script> |
-if (window.testRunner) |
+if (window.testRunner) { |
testRunner.dumpAsText(); |
+ testRunner.overridePreference("WebKitAllowRunningInsecureContent", true); |
+} |
</script> |
<p>This test loads a secure iframe that loads an insecure style sheet. |
We should trigger a mixed content callback because an active network attacker |