| <html> |
| <body> |
| <script> |
| if (window.testRunner) { |
| testRunner.waitUntilDone(); |
| testRunner.dumpAsText(); |
| testRunner.setCanOpenWindows(); |
| testRunner.setCloseRemainingWindowsWhenComplete(true); |
| } |
| |
| window.addEventListener("message", function (e) { |
| if (window.testRunner) |
| testRunner.notifyDone(); |
| }, false); |
| |
| </script> |
| <p>This test opens a window that shows a form with "action" pointing to an insecure |
| location. We should not trigger a mixed content callback because the main frame |
| in the window is HTTPS but is posting to a `javascript:` location.</p> |
| <script> |
| window.open("https://127.0.0.1:8443/security/mixedContent/resources/frame-with-javascript-formSubmission.html"); |
| </script> |
| </body> |
| </html> |