| Index: LayoutTests/http/tests/security/mixedContent/insecure-css-in-iframe.html
|
| diff --git a/LayoutTests/http/tests/security/mixedContent/insecure-css-in-iframe.html b/LayoutTests/http/tests/security/mixedContent/insecure-css-in-iframe.html
|
| index 8c9a5610215fd2c4ec9b788e38d7571f7493dab6..912564a44d600481b06a62af498945e4858201b3 100644
|
| --- a/LayoutTests/http/tests/security/mixedContent/insecure-css-in-iframe.html
|
| +++ b/LayoutTests/http/tests/security/mixedContent/insecure-css-in-iframe.html
|
| @@ -1,8 +1,10 @@
|
| <html>
|
| <body>
|
| <script>
|
| -if (window.testRunner)
|
| +if (window.testRunner) {
|
| testRunner.dumpAsText();
|
| + testRunner.overridePreference("WebKitAllowRunningInsecureContent", true);
|
| +}
|
| </script>
|
| <p>This test loads a secure iframe that loads an insecure style sheet.
|
| We should trigger a mixed content callback because an active network attacker
|
|
|