| frame "<!--framePath //<!--frame0-->-->" - didStartProvisionalLoadForFrame |
| main frame - didFinishDocumentLoadForFrame |
| frame "<!--framePath //<!--frame0-->-->" - didCommitLoadForFrame |
| frame "<!--framePath //<!--frame0-->/<!--frame0-->-->" - didStartProvisionalLoadForFrame |
| frame "<!--framePath //<!--frame0-->-->" - didFinishDocumentLoadForFrame |
| frame "<!--framePath //<!--frame0-->/<!--frame0-->-->" - didCommitLoadForFrame |
| frame "<!--framePath //<!--frame0-->/<!--frame0-->-->" - didFinishDocumentLoadForFrame |
| frame "<!--framePath //<!--frame0-->/<!--frame0-->-->" - didHandleOnloadEventsForFrame |
| frame "<!--framePath //<!--frame0-->-->" - didHandleOnloadEventsForFrame |
| main frame - didHandleOnloadEventsForFrame |
| frame "<!--framePath //<!--frame0-->/<!--frame0-->-->" - didFinishLoadForFrame |
| frame "<!--framePath //<!--frame0-->-->" - didFinishLoadForFrame |
| main frame - didFinishLoadForFrame |
| This test loads a secure iframe that loads an insecure iframe. We should *not* get a mixed content callback becase the main frame is HTTP and the grandchild iframe doesn't contaminate the child iframe's security origin with mixed content. |
| |
| |