Commit f7346b21 authored by ossy@webkit.org's avatar ossy@webkit.org
Browse files

Unreviewed.

[Qt] DRT sideeffect revealed by r63657
https://bugs.webkit.org/show_bug.cgi?id=42578

Remove incorrect Qt specific expected file for http/tests/security/mixedContent/insecure-css-in-main-frame.html.
Platform independent is the correct one.

Add http/tests/security/mixedContent/insecure-css-in-main-frame.html 
to the Skipped list, because it is a flakey test due to this bug.

* platform/qt/Skipped:
* platform/qt/http/tests/security/mixedContent/insecure-css-in-main-frame-expected.txt: Removed.



git-svn-id: http://svn.webkit.org/repository/webkit/trunk@70498 268f45cc-cd09-0410-ab3c-d52691b4dbfc
parent ac94e466
2010-10-25 Csaba Osztrogonác <ossy@webkit.org>
Unreviewed.
[Qt] DRT sideeffect revealed by r63657
https://bugs.webkit.org/show_bug.cgi?id=42578
Remove incorrect Qt specific expected file for http/tests/security/mixedContent/insecure-css-in-main-frame.html.
Platform independent is the correct one.
Add http/tests/security/mixedContent/insecure-css-in-main-frame.html
to the Skipped list, because it is a flakey test due to this bug.
* platform/qt/Skipped:
* platform/qt/http/tests/security/mixedContent/insecure-css-in-main-frame-expected.txt: Removed.
2010-10-25 Andy Estes <aestes@apple.com>
 
Reviewed by Simon Fraser.
......@@ -5358,6 +5358,7 @@ fast/forms/search-cancel-button-events.html
# [Qt] DRT sideeffect revealed by r63657
# https://bugs.webkit.org/show_bug.cgi?id=42578
http/tests/security/mixedContent/insecure-css-in-main-frame.html
http/tests/xmlhttprequest/authorization-header.html
http/tests/xmlhttprequest/null-auth.php
......
main frame - didStartProvisionalLoadForFrame
main frame - didFinishDocumentLoadForFrame
main frame - didHandleOnloadEventsForFrame
main frame - didFinishLoadForFrame
main frame - didCommitLoadForFrame
didDisplayInsecureContent
main frame - didFinishDocumentLoadForFrame
main frame - didHandleOnloadEventsForFrame
main frame - didFinishLoadForFrame
This test opens a window that loads an insecure style sheet. We should trigger a mixed content callback because the main frame in the window is HTTPS but is displaying insecure content.
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment