<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>[191652] trunk</title>
</head>
<body>
<style type="text/css"><!--
#msg dl.meta { border: 1px #006 solid; background: #369; padding: 6px; color: #fff; }
#msg dl.meta dt { float: left; width: 6em; font-weight: bold; }
#msg dt:after { content:':';}
#msg dl, #msg dt, #msg ul, #msg li, #header, #footer, #logmsg { font-family: verdana,arial,helvetica,sans-serif; font-size: 10pt; }
#msg dl a { font-weight: bold}
#msg dl a:link { color:#fc3; }
#msg dl a:active { color:#ff0; }
#msg dl a:visited { color:#cc6; }
h3 { font-family: verdana,arial,helvetica,sans-serif; font-size: 10pt; font-weight: bold; }
#msg pre { overflow: auto; background: #ffc; border: 1px #fa0 solid; padding: 6px; }
#logmsg { background: #ffc; border: 1px #fa0 solid; padding: 1em 1em 0 1em; }
#logmsg p, #logmsg pre, #logmsg blockquote { margin: 0 0 1em 0; }
#logmsg p, #logmsg li, #logmsg dt, #logmsg dd { line-height: 14pt; }
#logmsg h1, #logmsg h2, #logmsg h3, #logmsg h4, #logmsg h5, #logmsg h6 { margin: .5em 0; }
#logmsg h1:first-child, #logmsg h2:first-child, #logmsg h3:first-child, #logmsg h4:first-child, #logmsg h5:first-child, #logmsg h6:first-child { margin-top: 0; }
#logmsg ul, #logmsg ol { padding: 0; list-style-position: inside; margin: 0 0 0 1em; }
#logmsg ul { text-indent: -1em; padding-left: 1em; }#logmsg ol { text-indent: -1.5em; padding-left: 1.5em; }
#logmsg > ul, #logmsg > ol { margin: 0 0 1em 0; }
#logmsg pre { background: #eee; padding: 1em; }
#logmsg blockquote { border: 1px solid #fa0; border-left-width: 10px; padding: 1em 1em 0 1em; background: white;}
#logmsg dl { margin: 0; }
#logmsg dt { font-weight: bold; }
#logmsg dd { margin: 0; padding: 0 0 0.5em 0; }
#logmsg dd:before { content:'\00bb';}
#logmsg table { border-spacing: 0px; border-collapse: collapse; border-top: 4px solid #fa0; border-bottom: 1px solid #fa0; background: #fff; }
#logmsg table th { text-align: left; font-weight: normal; padding: 0.2em 0.5em; border-top: 1px dotted #fa0; }
#logmsg table td { text-align: right; border-top: 1px dotted #fa0; padding: 0.2em 0.5em; }
#logmsg table thead th { text-align: center; border-bottom: 1px solid #fa0; }
#logmsg table th.Corner { text-align: left; }
#logmsg hr { border: none 0; border-top: 2px dashed #fa0; height: 1px; }
#header, #footer { color: #fff; background: #636; border: 1px #300 solid; padding: 6px; }
#patch { width: 100%; }
#patch h4 {font-family: verdana,arial,helvetica,sans-serif;font-size:10pt;padding:8px;background:#369;color:#fff;margin:0;}
#patch .propset h4, #patch .binary h4 {margin:0;}
#patch pre {padding:0;line-height:1.2em;margin:0;}
#patch .diff {width:100%;background:#eee;padding: 0 0 10px 0;overflow:auto;}
#patch .propset .diff, #patch .binary .diff {padding:10px 0;}
#patch span {display:block;padding:0 10px;}
#patch .modfile, #patch .addfile, #patch .delfile, #patch .propset, #patch .binary, #patch .copfile {border:1px solid #ccc;margin:10px 0;}
#patch ins {background:#dfd;text-decoration:none;display:block;padding:0 10px;}
#patch del {background:#fdd;text-decoration:none;display:block;padding:0 10px;}
#patch .lines, .info {color:#888;background:#fff;}
--></style>
<div id="msg">
<dl class="meta">
<dt>Revision</dt> <dd><a href="http://trac.webkit.org/projects/webkit/changeset/191652">191652</a></dd>
<dt>Author</dt> <dd>cdumez@apple.com</dd>
<dt>Date</dt> <dd>2015-10-27 21:40:04 -0700 (Tue, 27 Oct 2015)</dd>
</dl>
<h3>Log Message</h3>
<pre>id of iframe incorrectly sets window name
https://bugs.webkit.org/show_bug.cgi?id=150565
Reviewed by Darin Adler.
Source/WebCore:
As per the specification, the iframe's contentWindow name should be an
empty string if the frame's name attribute is unset:
http://www.whatwg.org/specs/web-apps/current-work/multipage/the-iframe-element.html#attr-iframe-name
Instead, WebKit was using the iframe's id as window name if the name
was unset.
Firefox, IE and Chrome behave according to the specification.
This is a merge of the following Blink commit:
https://src.chromium.org/viewvc/blink?revision=169803&view=revision
Test: fast/frames/iframe-no-name.html
* html/HTMLFrameElementBase.cpp:
(WebCore::HTMLFrameElementBase::parseAttribute):
(WebCore::HTMLFrameElementBase::insertedInto): Deleted.
LayoutTests:
Add a test to check that id of iframe incorrectly sets the window name
when the iframe's name is not set.
Also set frame names in a lot of layout tests so that they keep giving
the same output.
* fast/css-generated-content/positioned-div-with-floating-after-content-crash.html:
* fast/dom/Window/slow-unload-handler-overwritten-date.html:
* fast/dom/Window/timeout-callback-scope.html:
* fast/dom/Window/window-access-after-navigation.html:
* fast/dom/Window/window-collection-length-no-crash.html:
* fast/dom/Window/window-special-properties-expected.txt:
* fast/dom/microtask-detach.html:
* fast/dom/microtask-inorder.html:
* fast/dom/microtask-reverse.html:
* fast/dom/wrapper-context.html:
* fast/dom/xss-DENIED-javascript-variations.html:
* fast/events/onbeforeunload-focused-iframe.html:
* fast/events/open-window-from-another-frame.html:
* fast/events/popup-blocked-to-post-blank.html:
* fast/events/popup-blocking-click-in-iframe.html:
* fast/events/popup-when-select-change.html:
* fast/frames/detach-frame-during-focus.html:
* fast/frames/frame-inherit-noresize-from-frameset.html:
* fast/frames/frame-programmatic-noresize.html:
* fast/frames/frame-with-noresize-can-be-resized-after-removal-of-noresize.html:
* fast/frames/frame-with-noresize-can-be-resized-after-setting-noResize-to-false.html:
* fast/frames/iframe-no-name-expected.txt: Added.
* fast/frames/iframe-no-name.html: Added.
* fast/frames/unload-reparent-sibling-frame.html:
* fast/history/form-submit-in-frame-via-onclick.html:
* fast/history/form-submit-in-frame.html:
* fast/history/same-document-iframes-changing-fragment.html:
* fast/history/same-document-iframes-changing-pushstate.html:
* fast/history/saves-state-after-frame-nav.html:
* fast/images/exif-orientation-image-document.html:
* fast/loader/resources/subframe-navigate-during-main-frame-load2.html:
* fast/overflow/scrollRevealButton.html:
* fast/parser/xml-colon-entity.html:
* fast/parser/xml-declaration-missing-ending-mark.html:
* fast/scrolling/latching/scroll-nested-iframe.html:
* fullscreen/full-screen-frameset.html:
* http/tests/contentextensions/block-cookies-in-csp-report.html:
* http/tests/contentextensions/block-cookies-in-ping.html:
* http/tests/contentextensions/block-cookies-send.html:
* http/tests/contentextensions/block-csp-report.html:
* http/tests/contentextensions/block-everything-unless-domain-iframe.html:
* http/tests/contentextensions/block-ping.html:
* http/tests/contentextensions/hide-on-csp-report.html:
* http/tests/contentextensions/hide-on-ping.html:
* http/tests/loading/text-content-type-with-binary-extension.html:
* http/tests/misc/location-replace-crossdomain.html:
* http/tests/multipart/multipart-wait-before-boundary.html:
* http/tests/navigation/no-referrer-subframe.html:
* http/tests/security/cross-frame-access-child-explicit-domain.html:
* http/tests/security/cross-frame-access-document-direct.html:
* http/tests/security/cross-frame-access-parent-explicit-domain.html:
* http/tests/security/cross-frame-access-port-explicit-domain.html:
* http/tests/security/cross-frame-access-port.html:
* http/tests/security/dataURL/resources/foreign-domain-data-url-accessee-iframe.html:
* http/tests/security/dataURL/resources/foreign-domain-data-url-accessor-iframe.html:
* http/tests/security/dataURL/xss-DENIED-from-data-url-in-foreign-domain-subframe.html:
* http/tests/security/dataURL/xss-DENIED-from-data-url-sub-frame-2-level.html:
* http/tests/security/dataURL/xss-DENIED-from-data-url-sub-frame.html:
* http/tests/security/dataURL/xss-DENIED-from-data-url-to-data-url.html:
* http/tests/security/dataURL/xss-DENIED-to-data-url-from-data-url.html:
* http/tests/security/dataURL/xss-DENIED-to-data-url-sub-frame-2-level.html:
* http/tests/security/dataURL/xss-DENIED-to-data-url-sub-frame-uppercase.html:
* http/tests/security/dataURL/xss-DENIED-to-data-url-sub-frame.html:
* http/tests/security/host-compare-case-insensitive.html:
* http/tests/security/javascriptURL/javascriptURL-execution-context-frame-location-htmldom.html:
* http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-getAttribute-value.html:
* http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-htmldom.html:
* http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttribute.html:
* http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttributeNS.html:
* http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttributeNode.html:
* http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttributeNodeNS.html:
* http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-getAttribute-value.html:
* http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-htmldom.html:
* http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttribute.html:
* http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttributeNS.html:
* http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttributeNode.html:
* http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttributeNodeNS.html:
* http/tests/security/javascriptURL/resources/foreign-domain-javascript-url-accessee-iframe.html:
* http/tests/security/javascriptURL/resources/foreign-domain-javascript-url-accessor-iframe.html:
* http/tests/security/javascriptURL/xss-ALLOWED-from-javascript-url-sub-frame-2-level.html:
* http/tests/security/javascriptURL/xss-ALLOWED-from-javascript-url-sub-frame.html:
* http/tests/security/javascriptURL/xss-ALLOWED-to-javascript-url-from-javscript-url.html:
* http/tests/security/javascriptURL/xss-ALLOWED-to-javascript-url-sub-frame.html:
* http/tests/security/protocol-compare-case-insensitive.html:
* http/tests/security/referrer-policy-redirect-link.html:
* http/tests/security/sandboxed-iframe-blocks-access-from-parent.html:
* http/tests/security/srcdoc-inherits-referrer-for-forms.html:
* http/tests/security/xssAuditor/full-block-base-href.html:
* http/tests/security/xssAuditor/full-block-iframe-javascript-url.html:
* http/tests/security/xssAuditor/full-block-iframe-no-inherit.php:
* http/tests/security/xssAuditor/full-block-javascript-link.html:
* http/tests/security/xssAuditor/full-block-link-onclick.html:
* http/tests/security/xssAuditor/full-block-object-tag.html:
* http/tests/security/xssAuditor/full-block-script-tag-cross-domain.html:
* http/tests/security/xssAuditor/full-block-script-tag-with-source.html:
* http/tests/security/xssAuditor/full-block-script-tag.html:
* http/tests/security/xssAuditor/malformed-xss-protection-header-1.html:
* http/tests/security/xssAuditor/malformed-xss-protection-header-2.html:
* http/tests/security/xssAuditor/malformed-xss-protection-header-3.html:
* http/tests/security/xssAuditor/malformed-xss-protection-header-4.html:
* http/tests/security/xssAuditor/malformed-xss-protection-header-5.html:
* http/tests/security/xssAuditor/malformed-xss-protection-header-6.html:
* http/tests/security/xssAuditor/malformed-xss-protection-header-7.html:
* http/tests/security/xssAuditor/malformed-xss-protection-header-8.html:
* http/tests/security/xssAuditor/malformed-xss-protection-header-9.html:
* http/tests/security/xssAuditor/report-script-tag-replace-state.html:
* http/tests/security/xssAuditor/report-script-tag.html:
* http/tests/security/xssAuditor/resources/utilities.js:
(sendRequestFromIFrame):
* http/tests/security/xssAuditor/xss-protection-parsing-02.html:
* http/tests/security/xssAuditor/xss-protection-parsing-03.html:
* http/tests/security/xssAuditor/xss-protection-parsing-04.html:
* platform/mac/webarchive/archive-empty-frame-dom-expected.txt:
* plugins/plugin-remove-subframe.html:
* webarchive/archive-empty-frame-dom-expected.webarchive:
* webarchive/archive-empty-frame-dom.html:</pre>
<h3>Modified Paths</h3>
<ul>
<li><a href="#trunkLayoutTestsChangeLog">trunk/LayoutTests/ChangeLog</a></li>
<li><a href="#trunkLayoutTestsfastcssgeneratedcontentpositioneddivwithfloatingaftercontentcrashhtml">trunk/LayoutTests/fast/css-generated-content/positioned-div-with-floating-after-content-crash.html</a></li>
<li><a href="#trunkLayoutTestsfastdomWindowslowunloadhandleroverwrittendatehtml">trunk/LayoutTests/fast/dom/Window/slow-unload-handler-overwritten-date.html</a></li>
<li><a href="#trunkLayoutTestsfastdomWindowtimeoutcallbackscopehtml">trunk/LayoutTests/fast/dom/Window/timeout-callback-scope.html</a></li>
<li><a href="#trunkLayoutTestsfastdomWindowwindowaccessafternavigationhtml">trunk/LayoutTests/fast/dom/Window/window-access-after-navigation.html</a></li>
<li><a href="#trunkLayoutTestsfastdomWindowwindowcollectionlengthnocrashhtml">trunk/LayoutTests/fast/dom/Window/window-collection-length-no-crash.html</a></li>
<li><a href="#trunkLayoutTestsfastdomWindowwindowspecialpropertiesexpectedtxt">trunk/LayoutTests/fast/dom/Window/window-special-properties-expected.txt</a></li>
<li><a href="#trunkLayoutTestsfastdommicrotaskdetachhtml">trunk/LayoutTests/fast/dom/microtask-detach.html</a></li>
<li><a href="#trunkLayoutTestsfastdommicrotaskinorderhtml">trunk/LayoutTests/fast/dom/microtask-inorder.html</a></li>
<li><a href="#trunkLayoutTestsfastdommicrotaskreversehtml">trunk/LayoutTests/fast/dom/microtask-reverse.html</a></li>
<li><a href="#trunkLayoutTestsfastdomwrappercontexthtml">trunk/LayoutTests/fast/dom/wrapper-context.html</a></li>
<li><a href="#trunkLayoutTestsfastdomxssDENIEDjavascriptvariationshtml">trunk/LayoutTests/fast/dom/xss-DENIED-javascript-variations.html</a></li>
<li><a href="#trunkLayoutTestsfasteventsonbeforeunloadfocusediframehtml">trunk/LayoutTests/fast/events/onbeforeunload-focused-iframe.html</a></li>
<li><a href="#trunkLayoutTestsfasteventsopenwindowfromanotherframehtml">trunk/LayoutTests/fast/events/open-window-from-another-frame.html</a></li>
<li><a href="#trunkLayoutTestsfasteventspopupblockedtopostblankhtml">trunk/LayoutTests/fast/events/popup-blocked-to-post-blank.html</a></li>
<li><a href="#trunkLayoutTestsfasteventspopupblockingclickiniframehtml">trunk/LayoutTests/fast/events/popup-blocking-click-in-iframe.html</a></li>
<li><a href="#trunkLayoutTestsfasteventspopupwhenselectchangehtml">trunk/LayoutTests/fast/events/popup-when-select-change.html</a></li>
<li><a href="#trunkLayoutTestsfastframesdetachframeduringfocushtml">trunk/LayoutTests/fast/frames/detach-frame-during-focus.html</a></li>
<li><a href="#trunkLayoutTestsfastframesframeinheritnoresizefromframesethtml">trunk/LayoutTests/fast/frames/frame-inherit-noresize-from-frameset.html</a></li>
<li><a href="#trunkLayoutTestsfastframesframeprogrammaticnoresizehtml">trunk/LayoutTests/fast/frames/frame-programmatic-noresize.html</a></li>
<li><a href="#trunkLayoutTestsfastframesframewithnoresizecanberesizedafterremovalofnoresizehtml">trunk/LayoutTests/fast/frames/frame-with-noresize-can-be-resized-after-removal-of-noresize.html</a></li>
<li><a href="#trunkLayoutTestsfastframesframewithnoresizecanberesizedaftersettingnoResizetofalsehtml">trunk/LayoutTests/fast/frames/frame-with-noresize-can-be-resized-after-setting-noResize-to-false.html</a></li>
<li><a href="#trunkLayoutTestsfastframessandboxediframepluginshtml">trunk/LayoutTests/fast/frames/sandboxed-iframe-plugins.html</a></li>
<li><a href="#trunkLayoutTestsfastframesunloadreparentsiblingframehtml">trunk/LayoutTests/fast/frames/unload-reparent-sibling-frame.html</a></li>
<li><a href="#trunkLayoutTestsfasthistoryformsubmitinframeviaonclickhtml">trunk/LayoutTests/fast/history/form-submit-in-frame-via-onclick.html</a></li>
<li><a href="#trunkLayoutTestsfasthistoryformsubmitinframehtml">trunk/LayoutTests/fast/history/form-submit-in-frame.html</a></li>
<li><a href="#trunkLayoutTestsfasthistorysamedocumentiframeschangingfragmenthtml">trunk/LayoutTests/fast/history/same-document-iframes-changing-fragment.html</a></li>
<li><a href="#trunkLayoutTestsfasthistorysamedocumentiframeschangingpushstatehtml">trunk/LayoutTests/fast/history/same-document-iframes-changing-pushstate.html</a></li>
<li><a href="#trunkLayoutTestsfasthistorysavesstateafterframenavhtml">trunk/LayoutTests/fast/history/saves-state-after-frame-nav.html</a></li>
<li><a href="#trunkLayoutTestsfastimagesexiforientationimagedocumenthtml">trunk/LayoutTests/fast/images/exif-orientation-image-document.html</a></li>
<li><a href="#trunkLayoutTestsfastloaderresourcessubframenavigateduringmainframeload2html">trunk/LayoutTests/fast/loader/resources/subframe-navigate-during-main-frame-load2.html</a></li>
<li><a href="#trunkLayoutTestsfastoverflowscrollRevealButtonhtml">trunk/LayoutTests/fast/overflow/scrollRevealButton.html</a></li>
<li><a href="#trunkLayoutTestsfastparserxmlcolonentityhtml">trunk/LayoutTests/fast/parser/xml-colon-entity.html</a></li>
<li><a href="#trunkLayoutTestsfastparserxmldeclarationmissingendingmarkhtml">trunk/LayoutTests/fast/parser/xml-declaration-missing-ending-mark.html</a></li>
<li><a href="#trunkLayoutTestsfastscrollinglatchingscrollnestediframehtml">trunk/LayoutTests/fast/scrolling/latching/scroll-nested-iframe.html</a></li>
<li><a href="#trunkLayoutTestsfullscreenfullscreenframesethtml">trunk/LayoutTests/fullscreen/full-screen-frameset.html</a></li>
<li><a href="#trunkLayoutTestshttptestscontentextensionsblockcookiesincspreporthtml">trunk/LayoutTests/http/tests/contentextensions/block-cookies-in-csp-report.html</a></li>
<li><a href="#trunkLayoutTestshttptestscontentextensionsblockcookiesinpinghtml">trunk/LayoutTests/http/tests/contentextensions/block-cookies-in-ping.html</a></li>
<li><a href="#trunkLayoutTestshttptestscontentextensionsblockcookiessendhtml">trunk/LayoutTests/http/tests/contentextensions/block-cookies-send.html</a></li>
<li><a href="#trunkLayoutTestshttptestscontentextensionsblockcspreporthtml">trunk/LayoutTests/http/tests/contentextensions/block-csp-report.html</a></li>
<li><a href="#trunkLayoutTestshttptestscontentextensionsblockeverythingunlessdomainiframehtml">trunk/LayoutTests/http/tests/contentextensions/block-everything-unless-domain-iframe.html</a></li>
<li><a href="#trunkLayoutTestshttptestscontentextensionsblockpinghtml">trunk/LayoutTests/http/tests/contentextensions/block-ping.html</a></li>
<li><a href="#trunkLayoutTestshttptestscontentextensionshideoncspreporthtml">trunk/LayoutTests/http/tests/contentextensions/hide-on-csp-report.html</a></li>
<li><a href="#trunkLayoutTestshttptestscontentextensionshideonpinghtml">trunk/LayoutTests/http/tests/contentextensions/hide-on-ping.html</a></li>
<li><a href="#trunkLayoutTestshttptestsloadingredirectmethodshtml">trunk/LayoutTests/http/tests/loading/redirect-methods.html</a></li>
<li><a href="#trunkLayoutTestshttptestsloadingtextcontenttypewithbinaryextensionhtml">trunk/LayoutTests/http/tests/loading/text-content-type-with-binary-extension.html</a></li>
<li><a href="#trunkLayoutTestshttptestsmisclocationreplacecrossdomainhtml">trunk/LayoutTests/http/tests/misc/location-replace-crossdomain.html</a></li>
<li><a href="#trunkLayoutTestshttptestsmultipartmultipartwaitbeforeboundaryhtml">trunk/LayoutTests/http/tests/multipart/multipart-wait-before-boundary.html</a></li>
<li><a href="#trunkLayoutTestshttptestsnavigationnoreferrersubframehtml">trunk/LayoutTests/http/tests/navigation/no-referrer-subframe.html</a></li>
<li><a href="#trunkLayoutTestshttptestsnavigationresourcesforwardandcancelframeshtml">trunk/LayoutTests/http/tests/navigation/resources/forward-and-cancel-frames.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecuritycrossframeaccesschildexplicitdomainhtml">trunk/LayoutTests/http/tests/security/cross-frame-access-child-explicit-domain.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecuritycrossframeaccessdocumentdirecthtml">trunk/LayoutTests/http/tests/security/cross-frame-access-document-direct.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecuritycrossframeaccessparentexplicitdomainhtml">trunk/LayoutTests/http/tests/security/cross-frame-access-parent-explicit-domain.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecuritycrossframeaccessportexplicitdomainhtml">trunk/LayoutTests/http/tests/security/cross-frame-access-port-explicit-domain.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecuritycrossframeaccessporthtml">trunk/LayoutTests/http/tests/security/cross-frame-access-port.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecuritycrossframeaccessprotocolexplicitdomainhtml">trunk/LayoutTests/http/tests/security/cross-frame-access-protocol-explicit-domain.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecuritycrossframeaccessprotocolhtml">trunk/LayoutTests/http/tests/security/cross-frame-access-protocol.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecuritydataURLresourcesforeigndomaindataurlaccesseeiframehtml">trunk/LayoutTests/http/tests/security/dataURL/resources/foreign-domain-data-url-accessee-iframe.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecuritydataURLresourcesforeigndomaindataurlaccessoriframehtml">trunk/LayoutTests/http/tests/security/dataURL/resources/foreign-domain-data-url-accessor-iframe.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecuritydataURLxssDENIEDfromdataurlinforeigndomainsubframehtml">trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-from-data-url-in-foreign-domain-subframe.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecuritydataURLxssDENIEDfromdataurlsubframe2levelhtml">trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-from-data-url-sub-frame-2-level.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecuritydataURLxssDENIEDfromdataurlsubframehtml">trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-from-data-url-sub-frame.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecuritydataURLxssDENIEDfromdataurltodataurlhtml">trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-from-data-url-to-data-url.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecuritydataURLxssDENIEDtodataurlfromdataurlhtml">trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-to-data-url-from-data-url.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecuritydataURLxssDENIEDtodataurlsubframe2levelhtml">trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-to-data-url-sub-frame-2-level.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecuritydataURLxssDENIEDtodataurlsubframeuppercasehtml">trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-to-data-url-sub-frame-uppercase.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecuritydataURLxssDENIEDtodataurlsubframehtml">trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-to-data-url-sub-frame.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityhostcomparecaseinsensitivehtml">trunk/LayoutTests/http/tests/security/host-compare-case-insensitive.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextframelocationhtmldomhtml">trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-location-htmldom.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextframesrcgetAttributevaluehtml">trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-getAttribute-value.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextframesrchtmldomhtml">trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-htmldom.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextframesrcsetAttributehtml">trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttribute.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextframesrcsetAttributeNShtml">trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttributeNS.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextframesrcsetAttributeNodehtml">trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttributeNode.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextframesrcsetAttributeNodeNShtml">trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttributeNodeNS.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextiframesrcgetAttributevaluehtml">trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-getAttribute-value.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextiframesrchtmldomhtml">trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-htmldom.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextiframesrcsetAttributehtml">trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttribute.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextiframesrcsetAttributeNShtml">trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttributeNS.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextiframesrcsetAttributeNodehtml">trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttributeNode.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextiframesrcsetAttributeNodeNShtml">trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttributeNodeNS.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityjavascriptURLresourcesforeigndomainjavascripturlaccesseeiframehtml">trunk/LayoutTests/http/tests/security/javascriptURL/resources/foreign-domain-javascript-url-accessee-iframe.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityjavascriptURLresourcesforeigndomainjavascripturlaccessoriframehtml">trunk/LayoutTests/http/tests/security/javascriptURL/resources/foreign-domain-javascript-url-accessor-iframe.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityjavascriptURLxssALLOWEDfromjavascripturlsubframe2levelhtml">trunk/LayoutTests/http/tests/security/javascriptURL/xss-ALLOWED-from-javascript-url-sub-frame-2-level.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityjavascriptURLxssALLOWEDfromjavascripturlsubframehtml">trunk/LayoutTests/http/tests/security/javascriptURL/xss-ALLOWED-from-javascript-url-sub-frame.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityjavascriptURLxssALLOWEDtojavascripturlfromjavscripturlhtml">trunk/LayoutTests/http/tests/security/javascriptURL/xss-ALLOWED-to-javascript-url-from-javscript-url.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityjavascriptURLxssALLOWEDtojavascripturlsubframe2levelhtml">trunk/LayoutTests/http/tests/security/javascriptURL/xss-ALLOWED-to-javascript-url-sub-frame-2-level.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityjavascriptURLxssALLOWEDtojavascripturlsubframehtml">trunk/LayoutTests/http/tests/security/javascriptURL/xss-ALLOWED-to-javascript-url-sub-frame.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityprotocolcomparecaseinsensitivehtml">trunk/LayoutTests/http/tests/security/protocol-compare-case-insensitive.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityreferrerpolicyredirectlinkhtml">trunk/LayoutTests/http/tests/security/referrer-policy-redirect-link.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecuritysandboxediframeblocksaccessfromparenthtml">trunk/LayoutTests/http/tests/security/sandboxed-iframe-blocks-access-from-parent.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecuritysrcdocinheritsreferrerforformshtml">trunk/LayoutTests/http/tests/security/srcdoc-inherits-referrer-for-forms.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditorfullblockbasehrefhtml">trunk/LayoutTests/http/tests/security/xssAuditor/full-block-base-href.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditorfullblockiframejavascripturlhtml">trunk/LayoutTests/http/tests/security/xssAuditor/full-block-iframe-javascript-url.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditorfullblockiframenoinheritphp">trunk/LayoutTests/http/tests/security/xssAuditor/full-block-iframe-no-inherit.php</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditorfullblockjavascriptlinkhtml">trunk/LayoutTests/http/tests/security/xssAuditor/full-block-javascript-link.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditorfullblocklinkonclickhtml">trunk/LayoutTests/http/tests/security/xssAuditor/full-block-link-onclick.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditorfullblockobjecttaghtml">trunk/LayoutTests/http/tests/security/xssAuditor/full-block-object-tag.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditorfullblockscripttagcrossdomainhtml">trunk/LayoutTests/http/tests/security/xssAuditor/full-block-script-tag-cross-domain.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditorfullblockscripttagwithsourcehtml">trunk/LayoutTests/http/tests/security/xssAuditor/full-block-script-tag-with-source.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditorfullblockscripttaghtml">trunk/LayoutTests/http/tests/security/xssAuditor/full-block-script-tag.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditormalformedxssprotectionheader1html">trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-1.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditormalformedxssprotectionheader2html">trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-2.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditormalformedxssprotectionheader3html">trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-3.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditormalformedxssprotectionheader4html">trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-4.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditormalformedxssprotectionheader5html">trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-5.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditormalformedxssprotectionheader6html">trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-6.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditormalformedxssprotectionheader7html">trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-7.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditormalformedxssprotectionheader8html">trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-8.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditormalformedxssprotectionheader9html">trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-9.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditorreportscripttagreplacestatehtml">trunk/LayoutTests/http/tests/security/xssAuditor/report-script-tag-replace-state.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditorreportscripttaghtml">trunk/LayoutTests/http/tests/security/xssAuditor/report-script-tag.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditorresourcesutilitiesjs">trunk/LayoutTests/http/tests/security/xssAuditor/resources/utilities.js</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditorxssprotectionparsing02html">trunk/LayoutTests/http/tests/security/xssAuditor/xss-protection-parsing-02.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditorxssprotectionparsing03html">trunk/LayoutTests/http/tests/security/xssAuditor/xss-protection-parsing-03.html</a></li>
<li><a href="#trunkLayoutTestshttptestssecurityxssAuditorxssprotectionparsing04html">trunk/LayoutTests/http/tests/security/xssAuditor/xss-protection-parsing-04.html</a></li>
<li><a href="#trunkLayoutTestsplatformmacwebarchivearchiveemptyframedomexpectedtxt">trunk/LayoutTests/platform/mac/webarchive/archive-empty-frame-dom-expected.txt</a></li>
<li><a href="#trunkLayoutTestsplatformmacwebarchivearchiveemptyframesourceexpectedtxt">trunk/LayoutTests/platform/mac/webarchive/archive-empty-frame-source-expected.txt</a></li>
<li><a href="#trunkLayoutTestspluginsgeturlwithiframetargethtml">trunk/LayoutTests/plugins/get-url-with-iframe-target.html</a></li>
<li><a href="#trunkLayoutTestspluginspluginremovesubframehtml">trunk/LayoutTests/plugins/plugin-remove-subframe.html</a></li>
<li><a href="#trunkLayoutTestswebarchivearchiveemptyframedomexpectedwebarchive">trunk/LayoutTests/webarchive/archive-empty-frame-dom-expected.webarchive</a></li>
<li><a href="#trunkLayoutTestswebarchivearchiveemptyframedomhtml">trunk/LayoutTests/webarchive/archive-empty-frame-dom.html</a></li>
<li><a href="#trunkLayoutTestswebarchivearchiveemptyframesourceexpectedwebarchive">trunk/LayoutTests/webarchive/archive-empty-frame-source-expected.webarchive</a></li>
<li><a href="#trunkLayoutTestswebarchivearchiveemptyframesourcehtml">trunk/LayoutTests/webarchive/archive-empty-frame-source.html</a></li>
<li><a href="#trunkSourceWebCoreChangeLog">trunk/Source/WebCore/ChangeLog</a></li>
<li><a href="#trunkSourceWebCorehtmlHTMLFrameElementBasecpp">trunk/Source/WebCore/html/HTMLFrameElementBase.cpp</a></li>
</ul>
<h3>Added Paths</h3>
<ul>
<li><a href="#trunkLayoutTestsfastframesiframenonameexpectedtxt">trunk/LayoutTests/fast/frames/iframe-no-name-expected.txt</a></li>
<li><a href="#trunkLayoutTestsfastframesiframenonamehtml">trunk/LayoutTests/fast/frames/iframe-no-name.html</a></li>
</ul>
</div>
<div id="patch">
<h3>Diff</h3>
<a id="trunkLayoutTestsChangeLog"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/ChangeLog (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/ChangeLog        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/ChangeLog        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -1,3 +1,133 @@
</span><ins>+2015-10-27 Chris Dumez <cdumez@apple.com>
+
+ id of iframe incorrectly sets window name
+ https://bugs.webkit.org/show_bug.cgi?id=150565
+
+ Reviewed by Darin Adler.
+
+ Add a test to check that id of iframe incorrectly sets the window name
+ when the iframe's name is not set.
+
+ Also set frame names in a lot of layout tests so that they keep giving
+ the same output.
+
+ * fast/css-generated-content/positioned-div-with-floating-after-content-crash.html:
+ * fast/dom/Window/slow-unload-handler-overwritten-date.html:
+ * fast/dom/Window/timeout-callback-scope.html:
+ * fast/dom/Window/window-access-after-navigation.html:
+ * fast/dom/Window/window-collection-length-no-crash.html:
+ * fast/dom/Window/window-special-properties-expected.txt:
+ * fast/dom/microtask-detach.html:
+ * fast/dom/microtask-inorder.html:
+ * fast/dom/microtask-reverse.html:
+ * fast/dom/wrapper-context.html:
+ * fast/dom/xss-DENIED-javascript-variations.html:
+ * fast/events/onbeforeunload-focused-iframe.html:
+ * fast/events/open-window-from-another-frame.html:
+ * fast/events/popup-blocked-to-post-blank.html:
+ * fast/events/popup-blocking-click-in-iframe.html:
+ * fast/events/popup-when-select-change.html:
+ * fast/frames/detach-frame-during-focus.html:
+ * fast/frames/frame-inherit-noresize-from-frameset.html:
+ * fast/frames/frame-programmatic-noresize.html:
+ * fast/frames/frame-with-noresize-can-be-resized-after-removal-of-noresize.html:
+ * fast/frames/frame-with-noresize-can-be-resized-after-setting-noResize-to-false.html:
+ * fast/frames/iframe-no-name-expected.txt: Added.
+ * fast/frames/iframe-no-name.html: Added.
+ * fast/frames/unload-reparent-sibling-frame.html:
+ * fast/history/form-submit-in-frame-via-onclick.html:
+ * fast/history/form-submit-in-frame.html:
+ * fast/history/same-document-iframes-changing-fragment.html:
+ * fast/history/same-document-iframes-changing-pushstate.html:
+ * fast/history/saves-state-after-frame-nav.html:
+ * fast/images/exif-orientation-image-document.html:
+ * fast/loader/resources/subframe-navigate-during-main-frame-load2.html:
+ * fast/overflow/scrollRevealButton.html:
+ * fast/parser/xml-colon-entity.html:
+ * fast/parser/xml-declaration-missing-ending-mark.html:
+ * fast/scrolling/latching/scroll-nested-iframe.html:
+ * fullscreen/full-screen-frameset.html:
+ * http/tests/contentextensions/block-cookies-in-csp-report.html:
+ * http/tests/contentextensions/block-cookies-in-ping.html:
+ * http/tests/contentextensions/block-cookies-send.html:
+ * http/tests/contentextensions/block-csp-report.html:
+ * http/tests/contentextensions/block-everything-unless-domain-iframe.html:
+ * http/tests/contentextensions/block-ping.html:
+ * http/tests/contentextensions/hide-on-csp-report.html:
+ * http/tests/contentextensions/hide-on-ping.html:
+ * http/tests/loading/text-content-type-with-binary-extension.html:
+ * http/tests/misc/location-replace-crossdomain.html:
+ * http/tests/multipart/multipart-wait-before-boundary.html:
+ * http/tests/navigation/no-referrer-subframe.html:
+ * http/tests/security/cross-frame-access-child-explicit-domain.html:
+ * http/tests/security/cross-frame-access-document-direct.html:
+ * http/tests/security/cross-frame-access-parent-explicit-domain.html:
+ * http/tests/security/cross-frame-access-port-explicit-domain.html:
+ * http/tests/security/cross-frame-access-port.html:
+ * http/tests/security/dataURL/resources/foreign-domain-data-url-accessee-iframe.html:
+ * http/tests/security/dataURL/resources/foreign-domain-data-url-accessor-iframe.html:
+ * http/tests/security/dataURL/xss-DENIED-from-data-url-in-foreign-domain-subframe.html:
+ * http/tests/security/dataURL/xss-DENIED-from-data-url-sub-frame-2-level.html:
+ * http/tests/security/dataURL/xss-DENIED-from-data-url-sub-frame.html:
+ * http/tests/security/dataURL/xss-DENIED-from-data-url-to-data-url.html:
+ * http/tests/security/dataURL/xss-DENIED-to-data-url-from-data-url.html:
+ * http/tests/security/dataURL/xss-DENIED-to-data-url-sub-frame-2-level.html:
+ * http/tests/security/dataURL/xss-DENIED-to-data-url-sub-frame-uppercase.html:
+ * http/tests/security/dataURL/xss-DENIED-to-data-url-sub-frame.html:
+ * http/tests/security/host-compare-case-insensitive.html:
+ * http/tests/security/javascriptURL/javascriptURL-execution-context-frame-location-htmldom.html:
+ * http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-getAttribute-value.html:
+ * http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-htmldom.html:
+ * http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttribute.html:
+ * http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttributeNS.html:
+ * http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttributeNode.html:
+ * http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttributeNodeNS.html:
+ * http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-getAttribute-value.html:
+ * http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-htmldom.html:
+ * http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttribute.html:
+ * http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttributeNS.html:
+ * http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttributeNode.html:
+ * http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttributeNodeNS.html:
+ * http/tests/security/javascriptURL/resources/foreign-domain-javascript-url-accessee-iframe.html:
+ * http/tests/security/javascriptURL/resources/foreign-domain-javascript-url-accessor-iframe.html:
+ * http/tests/security/javascriptURL/xss-ALLOWED-from-javascript-url-sub-frame-2-level.html:
+ * http/tests/security/javascriptURL/xss-ALLOWED-from-javascript-url-sub-frame.html:
+ * http/tests/security/javascriptURL/xss-ALLOWED-to-javascript-url-from-javscript-url.html:
+ * http/tests/security/javascriptURL/xss-ALLOWED-to-javascript-url-sub-frame.html:
+ * http/tests/security/protocol-compare-case-insensitive.html:
+ * http/tests/security/referrer-policy-redirect-link.html:
+ * http/tests/security/sandboxed-iframe-blocks-access-from-parent.html:
+ * http/tests/security/srcdoc-inherits-referrer-for-forms.html:
+ * http/tests/security/xssAuditor/full-block-base-href.html:
+ * http/tests/security/xssAuditor/full-block-iframe-javascript-url.html:
+ * http/tests/security/xssAuditor/full-block-iframe-no-inherit.php:
+ * http/tests/security/xssAuditor/full-block-javascript-link.html:
+ * http/tests/security/xssAuditor/full-block-link-onclick.html:
+ * http/tests/security/xssAuditor/full-block-object-tag.html:
+ * http/tests/security/xssAuditor/full-block-script-tag-cross-domain.html:
+ * http/tests/security/xssAuditor/full-block-script-tag-with-source.html:
+ * http/tests/security/xssAuditor/full-block-script-tag.html:
+ * http/tests/security/xssAuditor/malformed-xss-protection-header-1.html:
+ * http/tests/security/xssAuditor/malformed-xss-protection-header-2.html:
+ * http/tests/security/xssAuditor/malformed-xss-protection-header-3.html:
+ * http/tests/security/xssAuditor/malformed-xss-protection-header-4.html:
+ * http/tests/security/xssAuditor/malformed-xss-protection-header-5.html:
+ * http/tests/security/xssAuditor/malformed-xss-protection-header-6.html:
+ * http/tests/security/xssAuditor/malformed-xss-protection-header-7.html:
+ * http/tests/security/xssAuditor/malformed-xss-protection-header-8.html:
+ * http/tests/security/xssAuditor/malformed-xss-protection-header-9.html:
+ * http/tests/security/xssAuditor/report-script-tag-replace-state.html:
+ * http/tests/security/xssAuditor/report-script-tag.html:
+ * http/tests/security/xssAuditor/resources/utilities.js:
+ (sendRequestFromIFrame):
+ * http/tests/security/xssAuditor/xss-protection-parsing-02.html:
+ * http/tests/security/xssAuditor/xss-protection-parsing-03.html:
+ * http/tests/security/xssAuditor/xss-protection-parsing-04.html:
+ * platform/mac/webarchive/archive-empty-frame-dom-expected.txt:
+ * plugins/plugin-remove-subframe.html:
+ * webarchive/archive-empty-frame-dom-expected.webarchive:
+ * webarchive/archive-empty-frame-dom.html:
+
</ins><span class="cx"> 2015-10-27 Jiewen Tan <jiewen_tan@apple.com>
</span><span class="cx">
</span><span class="cx"> Null dereference loading Blink layout test editing/execCommand/format-block-uneditable-crash.html
</span></span></pre></div>
<a id="trunkLayoutTestsfastcssgeneratedcontentpositioneddivwithfloatingaftercontentcrashhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/css-generated-content/positioned-div-with-floating-after-content-crash.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/css-generated-content/positioned-div-with-floating-after-content-crash.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/css-generated-content/positioned-div-with-floating-after-content-crash.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -8,4 +8,4 @@
</span><span class="cx"> }
</span><span class="cx"> window.onload = runTest;
</span><span class="cx"> </script>
</span><del>-<iframe id="frame" src="resources/positioned-div-with-floating-after-content-crash-frame1.html"></iframe>
</del><ins>+<iframe id="frame" name="frame" src="resources/positioned-div-with-floating-after-content-crash-frame1.html"></iframe>
</ins></span></pre></div>
<a id="trunkLayoutTestsfastdomWindowslowunloadhandleroverwrittendatehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/dom/Window/slow-unload-handler-overwritten-date.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/dom/Window/slow-unload-handler-overwritten-date.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/dom/Window/slow-unload-handler-overwritten-date.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -28,6 +28,6 @@
</span><span class="cx"> Succeeds if it does not crash.
</span><span class="cx"> </p>
</span><span class="cx"> <p id="results" class="pass"></p>
</span><del>-<iframe id="theiframe" style="border: 0" src="resources/slow-unload-handler-overwritten-date1.html">
</del><ins>+<iframe id="theiframe" name="theiframe" style="border: 0" src="resources/slow-unload-handler-overwritten-date1.html">
</ins><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestsfastdomWindowtimeoutcallbackscopehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/dom/Window/timeout-callback-scope.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/dom/Window/timeout-callback-scope.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/dom/Window/timeout-callback-scope.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -37,6 +37,6 @@
</span><span class="cx"> <p>Test verifies that a timeout callback is run in the proper execution context. 2 timeouts are set on a child iframe's window. 'Closure' callback should execute in the main page, 'string' callback should execute in the iframe. Test passes if you see 2 lines 'PASS' below.</p>
</span><span class="cx"> <div id=closureResult>FAIL</div>
</span><span class="cx"> <div id=stringResult>FAIL</div>
</span><del>-<iframe style="display:none" src="about:blank" id=testIframe></iframe>
</del><ins>+<iframe style="display:none" src="about:blank" id=testIframe name=testIframe></iframe>
</ins><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestsfastdomWindowwindowaccessafternavigationhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/dom/Window/window-access-after-navigation.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/dom/Window/window-access-after-navigation.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/dom/Window/window-access-after-navigation.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -26,6 +26,6 @@
</span><span class="cx"> <p>Test for <a href="http://bugs.webkit.org/show_bug.cgi?id=27394">bug 27394</a>:
</span><span class="cx"> properties on a window object should be accessible after the frame of the window object has navigated to another page.</p>
</span><span class="cx"> <div id='result'>FAILED</div>
</span><del>-<iframe id='subframe' onload='checkWindowAccess()'></iframe>
</del><ins>+<iframe id='subframe' name='subframe' onload='checkWindowAccess()'></iframe>
</ins><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestsfastdomWindowwindowcollectionlengthnocrashhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/dom/Window/window-collection-length-no-crash.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/dom/Window/window-collection-length-no-crash.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/dom/Window/window-collection-length-no-crash.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -3,7 +3,7 @@
</span><span class="cx"> <body>
</span><span class="cx"> <p id="description"></p>
</span><span class="cx"> <br>
</span><del>-<iframe id="subframe"></iframe>
</del><ins>+<iframe id="subframe" name='subframe'></iframe>
</ins><span class="cx"> <br>
</span><span class="cx"> This tests that window.frames.length does not crash the browser after the
</span><span class="cx"> frame navigates away from the current page. You should see "SUCCESS" below
</span></span></pre></div>
<a id="trunkLayoutTestsfastdomWindowwindowspecialpropertiesexpectedtxt"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/dom/Window/window-special-properties-expected.txt (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/dom/Window/window-special-properties-expected.txt        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/dom/Window/window-special-properties-expected.txt        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -42,8 +42,8 @@
</span><span class="cx"> Nonexistent iframe name: undefined
</span><span class="cx"> Iframe by name (unique): single WINDOW
</span><span class="cx"> Iframe by name (multiple): single WINDOW
</span><del>-Iframe by id (unique): single WINDOW
-Iframe by id (multiple): single WINDOW
</del><ins>+Iframe by id (unique): single IFRAME(id)
+Iframe by id (multiple): collection(2) IFRAME(id) IFRAME(id)
</ins><span class="cx"> Iframe by id/name mixed: single WINDOW
</span><span class="cx">
</span><span class="cx"> Nonexistent span name: undefined
</span><span class="lines">@@ -53,7 +53,7 @@
</span><span class="cx"> Span by id (multiple): collection(2) SPAN(id) SPAN(id)
</span><span class="cx"> Span by id/name mixed: collection(2) SPAN(id) SPAN(id)
</span><span class="cx">
</span><del>-Mixed by id: single WINDOW
</del><ins>+Mixed by id: collection(7) IMG(id) FORM(id) APPLET(id) EMBED(id) OBJECT(id) IFRAME(id) SPAN(id)
</ins><span class="cx"> Mixed by name: single WINDOW
</span><span class="cx"> Mixed by id (no iframe): collection(6) IMG(id) FORM(id) APPLET(id) EMBED(id) OBJECT(id) SPAN(id)
</span><span class="cx"> Mixed by name (no iframe): collection(5) IMG(name) FORM(name) APPLET(name) EMBED(name) OBJECT(name)
</span></span></pre></div>
<a id="trunkLayoutTestsfastdommicrotaskdetachhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/dom/microtask-detach.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/dom/microtask-detach.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/dom/microtask-detach.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -7,8 +7,8 @@
</span><span class="cx"> }
</span><span class="cx"> </script>
</span><span class="cx"> <body>
</span><del>-<iframe id="frame1"></iframe>
-<iframe id="frame2"></iframe>
</del><ins>+<iframe id="frame1" name="frame1"></iframe>
+<iframe id="frame2" name="frame2"></iframe>
</ins><span class="cx"> <script>
</span><span class="cx">
</span><span class="cx"> (function() {
</span></span></pre></div>
<a id="trunkLayoutTestsfastdommicrotaskinorderhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/dom/microtask-inorder.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/dom/microtask-inorder.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/dom/microtask-inorder.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -6,8 +6,8 @@
</span><span class="cx"> testRunner.waitUntilDone();
</span><span class="cx"> }
</span><span class="cx"> </script>
</span><del>-<iframe id="frame1"></iframe>
-<iframe id="frame2"></iframe>
</del><ins>+<iframe id="frame1" name="frame1"></iframe>
+<iframe id="frame2" name="frame2"></iframe>
</ins><span class="cx"> <script>
</span><span class="cx">
</span><span class="cx"> var iframe1 = document.querySelector("#frame1").contentWindow;
</span></span></pre></div>
<a id="trunkLayoutTestsfastdommicrotaskreversehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/dom/microtask-reverse.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/dom/microtask-reverse.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/dom/microtask-reverse.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -6,8 +6,8 @@
</span><span class="cx"> testRunner.waitUntilDone();
</span><span class="cx"> }
</span><span class="cx"> </script>
</span><del>-<iframe id="frame1"></iframe>
-<iframe id="frame2"></iframe>
</del><ins>+<iframe id="frame1" name="frame1"></iframe>
+<iframe id="frame2" name="frame2"></iframe>
</ins><span class="cx"> <script>
</span><span class="cx">
</span><span class="cx"> var iframe1 = document.querySelector("#frame1").contentWindow;
</span></span></pre></div>
<a id="trunkLayoutTestsfastdomwrappercontexthtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/dom/wrapper-context.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/dom/wrapper-context.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/dom/wrapper-context.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -4,7 +4,7 @@
</span><span class="cx"> You should see PASS below.
</span><span class="cx"> <br>
</span><span class="cx"> <div id="output"></div>
</span><del>-<iframe id="inner" src="resources/wrapper-context-inner.html"></iframe>
</del><ins>+<iframe id="inner" name="inner" src="resources/wrapper-context-inner.html"></iframe>
</ins><span class="cx"> <script>
</span><span class="cx"> if (window.testRunner) {
</span><span class="cx"> testRunner.dumpAsText();
</span></span></pre></div>
<a id="trunkLayoutTestsfastdomxssDENIEDjavascriptvariationshtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/dom/xss-DENIED-javascript-variations.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/dom/xss-DENIED-javascript-variations.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/dom/xss-DENIED-javascript-variations.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -31,7 +31,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body onload="runTest()">
</span><span class="cx"> <br>
</span><del>-<iframe id = 'DUPA' src="data:text/html,<p>Inner text should not be replaced.<p>"></iframe>
</del><ins>+<iframe id = 'DUPA' name='DUPA' src="data:text/html,<p>Inner text should not be replaced.<p>"></iframe>
</ins><span class="cx">
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestsfasteventsonbeforeunloadfocusediframehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/events/onbeforeunload-focused-iframe.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/events/onbeforeunload-focused-iframe.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/events/onbeforeunload-focused-iframe.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -2,7 +2,7 @@
</span><span class="cx"> <body>
</span><span class="cx"> New window with beforeUnload handler.<br>
</span><span class="cx"> You should see "beforeUnload" in the console log if you try to close the window.<br>
</span><del>- <iframe src="resources/onbeforeunload-focused-iframe-frame.html" id="focusedFrame"></iframe>
</del><ins>+ <iframe src="resources/onbeforeunload-focused-iframe-frame.html" id="focusedFrame" name="focusedFrame"></iframe>
</ins><span class="cx"> <script>
</span><span class="cx"> if (window.testRunner) {
</span><span class="cx"> testRunner.dumpAsText();
</span></span></pre></div>
<a id="trunkLayoutTestsfasteventsopenwindowfromanotherframehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/events/open-window-from-another-frame.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/events/open-window-from-another-frame.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/events/open-window-from-another-frame.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -35,7 +35,7 @@
</span><span class="cx"> This tests that window.open works across frames.<br>
</span><span class="cx"> To run manually click the link below.<br>
</span><span class="cx"> <a href="resources/greenbox.png" id="link">GreenBox or Success page.</a><br>
</span><del>- <iframe src="resources/open-window-from-another-frame-otherFrame.html" id="otherFrame"></iframe>
</del><ins>+ <iframe src="resources/open-window-from-another-frame-otherFrame.html" id="otherFrame" name="otherFrame"></iframe>
</ins><span class="cx"> <div id="res"></div>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestsfasteventspopupblockedtopostblankhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/events/popup-blocked-to-post-blank.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/events/popup-blocked-to-post-blank.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/events/popup-blocked-to-post-blank.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -27,6 +27,6 @@
</span><span class="cx"> <form id="form2" action="data:text/html,<b>hello!</b><script>window.testRunner && testRunner.notifyDone()</script>" target="target">
</span><span class="cx"> <input type="submit" value="Submit local page Javascript"/>
</span><span class="cx"> </form>
</span><del>-<iframe id="target"></iframe>
</del><ins>+<iframe id="target" name="target"></iframe>
</ins><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestsfasteventspopupblockingclickiniframehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/events/popup-blocking-click-in-iframe.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/events/popup-blocking-click-in-iframe.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/events/popup-blocking-click-in-iframe.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -51,7 +51,7 @@
</span><span class="cx"> </script>
</span><span class="cx"> </head>
</span><span class="cx"> <body style="border: 0; margin: 0" onload="test()">
</span><del>- <iframe style="border: 0; margin: 0" src="resources/popup-blocking-click-in-iframe-otherFrame.html" id="otherFrame"></iframe>
</del><ins>+ <iframe style="border: 0; margin: 0" src="resources/popup-blocking-click-in-iframe-otherFrame.html" id="otherFrame" name="otherFrame"></iframe>
</ins><span class="cx">
</span><span class="cx"> <p>This tests that popup blocking does not supress windows opened in an iframe if the event handler is a function from an enclosing frame.</p>
</span><span class="cx"> <p>To run manually click the link in the iframe above with popup blocking enabled.</p>
</span></span></pre></div>
<a id="trunkLayoutTestsfasteventspopupwhenselectchangehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/events/popup-when-select-change.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/events/popup-when-select-change.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/events/popup-when-select-change.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -45,6 +45,6 @@
</span><span class="cx"> <form id="form2" action="data:text/html,<b>hello!</b><script>window.testRunner && testRunner.notifyDone()</script>" target="panel">
</span><span class="cx"> <input type="submit" value="Submit local page Javascript"/>
</span><span class="cx"> </form>
</span><del>-<iframe id="target"></iframe><iframe id="panel"></iframe>
</del><ins>+<iframe id="target" name="target"></iframe><iframe id="panel" name="panel"></iframe>
</ins><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestsfastframesdetachframeduringfocushtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/frames/detach-frame-during-focus.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/frames/detach-frame-during-focus.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/frames/detach-frame-during-focus.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -23,5 +23,5 @@
</span><span class="cx"> </script>
</span><span class="cx"> <div>
</span><span class="cx"> <input value="foo" id="outerInput">
</span><del>- <iframe onload="startTest()" id="frame1" height="100" width="540" srcdoc="&lt;input id='innerInput'>"></iframe>
</del><ins>+ <iframe onload="startTest()" id="frame1" name="frame1" height="100" width="540" srcdoc="&lt;input id='innerInput'>"></iframe>
</ins><span class="cx"> </div>
</span></span></pre></div>
<a id="trunkLayoutTestsfastframesframeinheritnoresizefromframesethtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/frames/frame-inherit-noresize-from-frameset.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/frames/frame-inherit-noresize-from-frameset.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/frames/frame-inherit-noresize-from-frameset.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -22,7 +22,7 @@
</span><span class="cx"> </script>
</span><span class="cx"> </head>
</span><span class="cx"> <frameset cols="200,*" border="10" noresize>
</span><del>- <frame id="testFrame" src="about:blank">
- <frame id="results" src="data:text/html,<p id='description'>This test can only be run using DRT.</p><pre id='console'></pre>">
</del><ins>+ <frame id="testFrame" name="testFrame" src="about:blank">
+ <frame id="results" name="results" src="data:text/html,<p id='description'>This test can only be run using DRT.</p><pre id='console'></pre>">
</ins><span class="cx"> </frameset>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestsfastframesframeprogrammaticnoresizehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/frames/frame-programmatic-noresize.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/frames/frame-programmatic-noresize.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/frames/frame-programmatic-noresize.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -45,7 +45,7 @@
</span><span class="cx"> </script>
</span><span class="cx"> </head>
</span><span class="cx"> <frameset cols="200,*" border="10">
</span><del>- <frame id="testFrame" src="about:blank">
- <frame id="results" src="data:text/html,<p id='description'>This test can only be run using DRT.</p><pre id='console'></pre>">
</del><ins>+ <frame id="testFrame" name="testFrame" src="about:blank">
+ <frame id="results" name="results" src="data:text/html,<p id='description'>This test can only be run using DRT.</p><pre id='console'></pre>">
</ins><span class="cx"> </frameset>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestsfastframesframewithnoresizecanberesizedafterremovalofnoresizehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/frames/frame-with-noresize-can-be-resized-after-removal-of-noresize.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/frames/frame-with-noresize-can-be-resized-after-removal-of-noresize.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/frames/frame-with-noresize-can-be-resized-after-removal-of-noresize.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -22,7 +22,7 @@
</span><span class="cx"> </script>
</span><span class="cx"> </head>
</span><span class="cx"> <frameset cols="200,*" border="10">
</span><del>- <frame id="testFrame" src="about:blank" noresize>
- <frame id="results" src="data:text/html,<p id='description'>This test can only be run using DRT.</p><pre id='console'></pre>">
</del><ins>+ <frame id="testFrame" name="testFrame" src="about:blank" noresize>
+ <frame id="results" name="results" src="data:text/html,<p id='description'>This test can only be run using DRT.</p><pre id='console'></pre>">
</ins><span class="cx"> </frameset>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestsfastframesframewithnoresizecanberesizedaftersettingnoResizetofalsehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/frames/frame-with-noresize-can-be-resized-after-setting-noResize-to-false.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/frames/frame-with-noresize-can-be-resized-after-setting-noResize-to-false.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/frames/frame-with-noresize-can-be-resized-after-setting-noResize-to-false.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -22,7 +22,7 @@
</span><span class="cx"> </script>
</span><span class="cx"> </head>
</span><span class="cx"> <frameset cols="200,*" border="10">
</span><del>- <frame id="testFrame" src="about:blank" noresize>
- <frame id="results" src="data:text/html,<p id='description'>This test can only be run using DRT.</p><pre id='console'></pre>">
</del><ins>+ <frame id="testFrame" name="testFrame" src="about:blank" noresize>
+ <frame id="results" name="results" src="data:text/html,<p id='description'>This test can only be run using DRT.</p><pre id='console'></pre>">
</ins><span class="cx"> </frameset>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestsfastframesiframenonameexpectedtxt"></a>
<div class="addfile"><h4>Added: trunk/LayoutTests/fast/frames/iframe-no-name-expected.txt (0 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/frames/iframe-no-name-expected.txt         (rev 0)
+++ trunk/LayoutTests/fast/frames/iframe-no-name-expected.txt        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -0,0 +1,12 @@
</span><ins>+Checks that the id of an iframe does not set the contentWindow's name if the iframe's name is not set.
+
+On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE".
+
+
+PASS frames[0].name is ""
+PASS frames[1].name is "name"
+PASS frames[2].name is "name"
+PASS successfullyParsed is true
+
+TEST COMPLETE
+
</ins></span></pre></div>
<a id="trunkLayoutTestsfastframesiframenonamehtml"></a>
<div class="addfile"><h4>Added: trunk/LayoutTests/fast/frames/iframe-no-name.html (0 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/frames/iframe-no-name.html         (rev 0)
+++ trunk/LayoutTests/fast/frames/iframe-no-name.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -0,0 +1,18 @@
</span><ins>+<!DOCTYPE html>
+<html>
+<head>
+<link rel="help" href="http://www.whatwg.org/specs/web-apps/current-work/multipage/the-iframe-element.html#attr-iframe-name">
+<script src="../../resources/js-test.js"></script>
+</head>
+<body>
+<iframe id="id"></iframe>
+<iframe name="name"></iframe>
+<iframe id="id" name="name"></iframe>
+<script>
+description("Checks that the id of an iframe does not set the contentWindow's name if the iframe's name is not set.");
+shouldBeEqualToString("frames[0].name", "");
+shouldBeEqualToString("frames[1].name", "name");
+shouldBeEqualToString("frames[2].name", "name");
+</script>
+</body>
+</html>
</ins></span></pre></div>
<a id="trunkLayoutTestsfastframessandboxediframepluginshtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/frames/sandboxed-iframe-plugins.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/frames/sandboxed-iframe-plugins.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/frames/sandboxed-iframe-plugins.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -30,11 +30,11 @@
</span><span class="cx">
</span><span class="cx"> <!-- Applets -->
</span><span class="cx">
</span><del>- <iframe id="appletFrame1"
</del><ins>+ <iframe id="appletFrame1" name="appletFrame1"
</ins><span class="cx"> style="width: 200px; height: 100px;"
</span><span class="cx"> src="resources/sandboxed-iframe-plugins-frame-applet.html">
</span><span class="cx"> </iframe>
</span><del>- <iframe id="appletFrame2"
</del><ins>+ <iframe id="appletFrame2" name="appletFrame2"
</ins><span class="cx"> style="width: 200px; height: 100px;"
</span><span class="cx"> sandbox="allow-same-origin allow-scripts"
</span><span class="cx"> src="resources/sandboxed-iframe-plugins-frame-applet.html">
</span><span class="lines">@@ -42,11 +42,11 @@
</span><span class="cx">
</span><span class="cx"> <!-- Embeds -->
</span><span class="cx">
</span><del>- <iframe id="embedFrame1"
</del><ins>+ <iframe id="embedFrame1" name="embedFrame1"
</ins><span class="cx"> style="width: 200px; height: 100px;"
</span><span class="cx"> src="resources/sandboxed-iframe-plugins-frame-embed.html">
</span><span class="cx"> </iframe>
</span><del>- <iframe id="embedFrame2"
</del><ins>+ <iframe id="embedFrame2" name="embedFrame2"
</ins><span class="cx"> style="width: 200px; height: 100px;"
</span><span class="cx"> sandbox="allow-same-origin"
</span><span class="cx"> src="resources/sandboxed-iframe-plugins-frame-embed.html">
</span><span class="lines">@@ -54,11 +54,11 @@
</span><span class="cx">
</span><span class="cx"> <!-- Objects -->
</span><span class="cx">
</span><del>- <iframe id="objectFrame1"
</del><ins>+ <iframe id="objectFrame1" name="objectFrame1"
</ins><span class="cx"> style="width: 200px; height: 100px;"
</span><span class="cx"> src="resources/sandboxed-iframe-plugins-frame-object.html">
</span><span class="cx"> </iframe>
</span><del>- <iframe id="objectFrame2"
</del><ins>+ <iframe id="objectFrame2" name="objectFrame2"
</ins><span class="cx"> style="width: 200px; height: 100px;"
</span><span class="cx"> sandbox="allow-same-origin"
</span><span class="cx"> src="resources/sandboxed-iframe-plugins-frame-object.html">
</span></span></pre></div>
<a id="trunkLayoutTestsfastframesunloadreparentsiblingframehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/frames/unload-reparent-sibling-frame.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/frames/unload-reparent-sibling-frame.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/frames/unload-reparent-sibling-frame.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -4,8 +4,8 @@
</span><span class="cx">
</span><span class="cx"> <div id="container">
</span><span class="cx"> <div id="inside">
</span><del>- <iframe id="frame1" srcdoc="frame1"></iframe>
- <iframe id="frame2" srcdoc="frame2"></iframe>
</del><ins>+ <iframe id="frame1" name="frame1" srcdoc="frame1"></iframe>
+ <iframe id="frame2" name="frame2" srcdoc="frame2"></iframe>
</ins><span class="cx"> </div>
</span><span class="cx"> </div>
</span><span class="cx">
</span></span></pre></div>
<a id="trunkLayoutTestsfasthistoryformsubmitinframeviaonclickhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/history/form-submit-in-frame-via-onclick.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/history/form-submit-in-frame-via-onclick.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/history/form-submit-in-frame-via-onclick.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -39,7 +39,7 @@
</span><span class="cx"> }
</span><span class="cx"> </script>
</span><span class="cx">
</span><del>-<iframe id="the-frame" src="resources/form-with-onclick-submit.html" onload="submitForm()"></iframe>
</del><ins>+<iframe id="the-frame" name="the-frame" src="resources/form-with-onclick-submit.html" onload="submitForm()"></iframe>
</ins><span class="cx">
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestsfasthistoryformsubmitinframehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/history/form-submit-in-frame.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/history/form-submit-in-frame.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/history/form-submit-in-frame.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -39,7 +39,7 @@
</span><span class="cx"> }
</span><span class="cx"> </script>
</span><span class="cx">
</span><del>-<iframe id="the-frame" src="resources/form-with-input-submit.html" onload="submitForm()"></iframe>
</del><ins>+<iframe id="the-frame" name="the-frame" src="resources/form-with-input-submit.html" onload="submitForm()"></iframe>
</ins><span class="cx">
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestsfasthistorysamedocumentiframeschangingfragmenthtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/history/same-document-iframes-changing-fragment.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/history/same-document-iframes-changing-fragment.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/history/same-document-iframes-changing-fragment.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -7,8 +7,8 @@
</span><span class="cx"> <p id="description"></p>
</span><span class="cx"> <pre id="console"></pre>
</span><span class="cx">
</span><del>-<iframe src="data:text/plain,iframe1" id="iframe1"></iframe>
-<iframe src="data:text/plain,iframe2" id="iframe2"></iframe>
</del><ins>+<iframe src="data:text/plain,iframe1" id="iframe1" name="iframe1"></iframe>
+<iframe src="data:text/plain,iframe2" id="iframe2" name="iframe2"></iframe>
</ins><span class="cx">
</span><span class="cx"> <script>
</span><span class="cx"> var wentBack = false;
</span><span class="lines">@@ -63,4 +63,4 @@
</span><span class="cx"> </script>
</span><span class="cx"> <script src="../../resources/js-test-post.js"></script>
</span><span class="cx"> </body>
</span><del>-</html>
</del><span class="cx">\ No newline at end of file
</span><ins>+</html>
</ins></span></pre></div>
<a id="trunkLayoutTestsfasthistorysamedocumentiframeschangingpushstatehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/history/same-document-iframes-changing-pushstate.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/history/same-document-iframes-changing-pushstate.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/history/same-document-iframes-changing-pushstate.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -7,8 +7,8 @@
</span><span class="cx"> <p id="description"></p>
</span><span class="cx"> <pre id="console"></pre>
</span><span class="cx">
</span><del>-<iframe src="data:text/plain,iframe1" id="iframe1"></iframe>
-<iframe src="data:text/plain,iframe2" id="iframe2"></iframe>
</del><ins>+<iframe src="data:text/plain,iframe1" id="iframe1" name="iframe1"></iframe>
+<iframe src="data:text/plain,iframe2" id="iframe2" name="iframe2"></iframe>
</ins><span class="cx">
</span><span class="cx"> <script>
</span><span class="cx"> var wentBack = false;
</span><span class="lines">@@ -63,4 +63,4 @@
</span><span class="cx"> </script>
</span><span class="cx"> <script src="../../resources/js-test-post.js"></script>
</span><span class="cx"> </body>
</span><del>-</html>
</del><span class="cx">\ No newline at end of file
</span><ins>+</html>
</ins></span></pre></div>
<a id="trunkLayoutTestsfasthistorysavesstateafterframenavhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/history/saves-state-after-frame-nav.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/history/saves-state-after-frame-nav.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/history/saves-state-after-frame-nav.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -60,7 +60,7 @@
</span><span class="cx">
</span><span class="cx"> <a href="resources/subframe-with-form.html" id="link" target="frame">Link</a>
</span><span class="cx"> <br>
</span><del>-<iframe id="frame" src="resources/subframe.html" onload="frameLoaded()"></iframe>
</del><ins>+<iframe id="frame" name="frame" src="resources/subframe.html" onload="frameLoaded()"></iframe>
</ins><span class="cx">
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestsfastimagesexiforientationimagedocumenthtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/images/exif-orientation-image-document.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/images/exif-orientation-image-document.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/images/exif-orientation-image-document.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -13,8 +13,8 @@
</span><span class="cx"> console.appendChild(li);
</span><span class="cx"> }
</span><span class="cx">
</span><del>-function imageSize(id) {
- var img = window.frames[id].document.querySelector('img');
</del><ins>+function imageSize(name) {
+ var img = window.frames[name].document.querySelector('img');
</ins><span class="cx"> return [img.offsetWidth, img.offsetHeight];
</span><span class="cx"> }
</span><span class="cx">
</span><span class="lines">@@ -41,17 +41,17 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body onload="load()">
</span><span class="cx"> <b>The images should be rotated respecting their EXIF orientation. In image documents, this happens independent of WebKitShouldRespectImageOrientation.</b><br><br>
</span><del>-<iframe id="img1" src="resources/exif-orientation-1-ul.jpg" frameborder=0></iframe>
-<iframe id="img2" src="resources/exif-orientation-2-ur.jpg" frameborder=0></iframe>
-<iframe id="img3" src="resources/exif-orientation-3-lr.jpg" frameborder=0></iframe>
-<iframe id="img4" src="resources/exif-orientation-4-lol.jpg" frameborder=0></iframe>
</del><ins>+<iframe name="img1" src="resources/exif-orientation-1-ul.jpg" frameborder=0></iframe>
+<iframe name="img2" src="resources/exif-orientation-2-ur.jpg" frameborder=0></iframe>
+<iframe name="img3" src="resources/exif-orientation-3-lr.jpg" frameborder=0></iframe>
+<iframe name="img4" src="resources/exif-orientation-4-lol.jpg" frameborder=0></iframe>
</ins><span class="cx"> <br>
</span><del>-<iframe id="img5" src="resources/exif-orientation-5-lu.jpg" frameborder=0></iframe>
-<iframe id="img6" src="resources/exif-orientation-6-ru.jpg" frameborder=0></iframe>
-<iframe id="img7" src="resources/exif-orientation-7-rl.jpg" frameborder=0></iframe>
-<iframe id="img8" src="resources/exif-orientation-8-llo.jpg" frameborder=0></iframe>
</del><ins>+<iframe name="img5" src="resources/exif-orientation-5-lu.jpg" frameborder=0></iframe>
+<iframe name="img6" src="resources/exif-orientation-6-ru.jpg" frameborder=0></iframe>
+<iframe name="img7" src="resources/exif-orientation-7-rl.jpg" frameborder=0></iframe>
+<iframe name="img8" src="resources/exif-orientation-8-llo.jpg" frameborder=0></iframe>
</ins><span class="cx"> <br>
</span><del>-<iframe id="img9" src="resources/exif-orientation-9-u.jpg" frameborder=0></iframe>
</del><ins>+<iframe name="img9" src="resources/exif-orientation-9-u.jpg" frameborder=0></iframe>
</ins><span class="cx"> <br>
</span><span class="cx"> <ul id="console"></ul>
</span><span class="cx"> </body>
</span></span></pre></div>
<a id="trunkLayoutTestsfastloaderresourcessubframenavigateduringmainframeload2html"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/loader/resources/subframe-navigate-during-main-frame-load2.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/loader/resources/subframe-navigate-during-main-frame-load2.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/loader/resources/subframe-navigate-during-main-frame-load2.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -13,7 +13,7 @@
</span><span class="cx"> <body onload="runTest();">
</span><span class="cx"> This test navigates an iframe while it's onload handler is still running.<br>
</span><span class="cx"> The iframe navigation should *not* result in a second back-history item being created for the top level navigation.<br>
</span><del>-<iframe id="subframe" src="about:blank"></iframe><br>
</del><ins>+<iframe id="subframe" name="subframe" src="about:blank"></iframe><br>
</ins><span class="cx">
</span><span class="cx"> </body>
</span><span class="cx">
</span></span></pre></div>
<a id="trunkLayoutTestsfastoverflowscrollRevealButtonhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/overflow/scrollRevealButton.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/overflow/scrollRevealButton.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/overflow/scrollRevealButton.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -2,7 +2,7 @@
</span><span class="cx"> <body onload="document.getElementById('fr').contentDocument.getElementById('bt').focus();">
</span><span class="cx"> <script>if(window.testRunner) testRunner.dumpChildFrameScrollPositions();</script>
</span><span class="cx"> <div style="height:500px"></div>
</span><del>-<iframe src="resources/scrollButton1.html" id="fr"></iframe>
</del><ins>+<iframe src="resources/scrollButton1.html" id="fr" name="fr"></iframe>
</ins><span class="cx"> <div style="height:500px"></div>
</span><span class="cx"> </body>
</span><del>-</html>
</del><span class="cx">\ No newline at end of file
</span><ins>+</html>
</ins></span></pre></div>
<a id="trunkLayoutTestsfastparserxmlcolonentityhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/parser/xml-colon-entity.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/parser/xml-colon-entity.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/parser/xml-colon-entity.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -10,6 +10,6 @@
</span><span class="cx">
</span><span class="cx"> <p>If you don't crash, you pass. A parsing error in the "xml-parser" subframe is expected.</p>
</span><span class="cx">
</span><del>-<iframe id="xml-parser" src="resources/xml-colon-entity.xml"></iframe>
</del><ins>+<iframe id="xml-parser" name="xml-parser" src="resources/xml-colon-entity.xml"></iframe>
</ins><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestsfastparserxmldeclarationmissingendingmarkhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/parser/xml-declaration-missing-ending-mark.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/parser/xml-declaration-missing-ending-mark.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/parser/xml-declaration-missing-ending-mark.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -14,6 +14,6 @@
</span><span class="cx">
</span><span class="cx"> <p>If you don't crash, you pass. A parsing error in the "xml-parser" subframe is expected.</p>
</span><span class="cx">
</span><del>-<iframe id="xml-parser" src="resources/xml-declaration-missing-ending-mark.xml"></iframe>
</del><ins>+<iframe id="xml-parser" name="xml-parser" src="resources/xml-declaration-missing-ending-mark.xml"></iframe>
</ins><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestsfastscrollinglatchingscrollnestediframehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fast/scrolling/latching/scroll-nested-iframe.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fast/scrolling/latching/scroll-nested-iframe.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fast/scrolling/latching/scroll-nested-iframe.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -81,7 +81,7 @@
</span><span class="cx"> <div id="source" style="height: 20px">
</span><span class="cx"> Put mouse inside the iframe (below) and flick downwards
</span><span class="cx"> </div>
</span><del>- <iframe id="scrollable_iframe" src="resources/scroll_nested_iframe_test_outer.html" onload="setupTopLevel();">
</del><ins>+ <iframe id="scrollable_iframe" name="scrollable_iframe" src="resources/scroll_nested_iframe_test_outer.html" onload="setupTopLevel();">
</ins><span class="cx"> </iframe>
</span><span class="cx"> </div>
</span><span class="cx"> <div id="console"></div>
</span></span></pre></div>
<a id="trunkLayoutTestsfullscreenfullscreenframesethtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/fullscreen/full-screen-frameset.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/fullscreen/full-screen-frameset.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/fullscreen/full-screen-frameset.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -31,5 +31,5 @@
</span><span class="cx"> </script>
</span><span class="cx"> <frameset rows="150,*">
</span><span class="cx"> <frame name="header" src="resources/not-allowed.html" webkitfullscreenallowed onload="runTest()">
</span><del>- <frame id="frame" src="resources/inner.html" onload="runTest()">
</del><ins>+ <frame id="frame" name="frame" src="resources/inner.html" onload="runTest()">
</ins><span class="cx"> </frameset>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestscontentextensionsblockcookiesincspreporthtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/contentextensions/block-cookies-in-csp-report.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/contentextensions/block-cookies-in-csp-report.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/contentextensions/block-cookies-in-csp-report.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -35,6 +35,6 @@
</span><span class="cx"> <img src="/cookies/resources/cookie-utility.php?queryfunction=setFooCookie"
</span><span class="cx"> onerror="deletePing();">
</span><span class="cx"> <div id="delete_ping_container"></div>
</span><del>-<iframe id="result_frame"><!-- Will contain ping data received by server --></iframe>
</del><ins>+<iframe id="result_frame" name="result_frame"><!-- Will contain ping data received by server --></iframe>
</ins><span class="cx"> </body>
</span><span class="cx">
</span></span></pre></div>
<a id="trunkLayoutTestshttptestscontentextensionsblockcookiesinpinghtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/contentextensions/block-cookies-in-ping.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/contentextensions/block-cookies-in-ping.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/contentextensions/block-cookies-in-ping.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -49,7 +49,7 @@
</span><span class="cx"> This test sets a cookie, then follows a link with a ping attribute where the ping URL matches a 'block-cookie' rule.
</span><span class="cx"> <img src="http://localhost:8000/cookies/resources/cookie-utility.php?queryfunction=setFooCookie"
</span><span class="cx"> onerror="loadLinkWithPing();">
</span><del>-<iframe id="link_frame"><!-- Will contain link with ping --></iframe>
-<iframe id="result_frame"><!-- Will contain ping data received by server --></iframe>
</del><ins>+<iframe id="link_frame" name="link_frame"><!-- Will contain link with ping --></iframe>
+<iframe id="result_frame" name="result_frame"><!-- Will contain ping data received by server --></iframe>
</ins><span class="cx"> </body>
</span><span class="cx">
</span></span></pre></div>
<a id="trunkLayoutTestshttptestscontentextensionsblockcookiessendhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/contentextensions/block-cookies-send.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/contentextensions/block-cookies-send.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/contentextensions/block-cookies-send.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -26,4 +26,4 @@
</span><span class="cx"> This test loads a resource that sets a cookie, then verifies that the cookie is not sent out when it should be blocked.<br>
</span><span class="cx"> <div id="logger"></div>
</span><span class="cx"> <img src="http://127.0.0.1:8000/cookies/resources/cookie-utility.php?queryfunction=setFooCookie" onerror="imageDone();">
</span><del>-<iframe id="iframe"></iframe>
</del><ins>+<iframe id="iframe" name="iframe"></iframe>
</ins></span></pre></div>
<a id="trunkLayoutTestshttptestscontentextensionsblockcspreporthtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/contentextensions/block-csp-report.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/contentextensions/block-csp-report.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/contentextensions/block-csp-report.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -32,6 +32,6 @@
</span><span class="cx"> <body>
</span><span class="cx"> This test creates a CSP violation report, but the report URL matches a 'block' rule.
</span><span class="cx"> <img src="resources/delete-ping.php?test=contentextensions-block-csp-report" onerror="loadCrossDomainImage();">
</span><del>-<iframe id="result_frame"><!-- Will contain ping data received by server --></iframe>
</del><ins>+<iframe id="result_frame" name="result_frame"><!-- Will contain ping data received by server --></iframe>
</ins><span class="cx"> </body>
</span><span class="cx">
</span></span></pre></div>
<a id="trunkLayoutTestshttptestscontentextensionsblockeverythingunlessdomainiframehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/contentextensions/block-everything-unless-domain-iframe.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/contentextensions/block-everything-unless-domain-iframe.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/contentextensions/block-everything-unless-domain-iframe.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -19,5 +19,5 @@
</span><span class="cx"> </script>
</span><span class="cx"> </head>
</span><span class="cx"> <body onload="bodyLoaded()">
</span><del>-<iframe id="iframe"></iframe>
</del><ins>+<iframe id="iframe" name="iframe"></iframe>
</ins><span class="cx"> </body>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestscontentextensionsblockpinghtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/contentextensions/block-ping.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/contentextensions/block-ping.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/contentextensions/block-ping.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -51,7 +51,7 @@
</span><span class="cx">
</span><span class="cx"> <body onload="loadLinkWithPing();">
</span><span class="cx"> This test follows a link with a ping attribute where the ping URL matches a 'block' rule.
</span><del>-<iframe id="link_frame"><!-- Will contain link with ping --></iframe>
-<iframe id="result_frame"><!-- Will contain ping data received by server --></iframe>
</del><ins>+<iframe id="link_frame" name="link_frame"><!-- Will contain link with ping --></iframe>
+<iframe id="result_frame" name="result_frame"><!-- Will contain ping data received by server --></iframe>
</ins><span class="cx"> </body>
</span><span class="cx">
</span></span></pre></div>
<a id="trunkLayoutTestshttptestscontentextensionshideoncspreporthtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/contentextensions/hide-on-csp-report.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/contentextensions/hide-on-csp-report.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/contentextensions/hide-on-csp-report.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -30,6 +30,6 @@
</span><span class="cx"> <p class="foo">This text should be hidden once the report is sent.</p>
</span><span class="cx"> <p class="bar">This text should remain visible.</p>
</span><span class="cx"> <img src="resources/delete-ping.php?test=contentextensions-hide-on-csp-report" onerror="loadCrossDomainImage();">
</span><del>-<iframe id="result_frame"><!-- Will contain ping data received by server --></iframe>
</del><ins>+<iframe id="result_frame" name="result_frame"><!-- Will contain ping data received by server --></iframe>
</ins><span class="cx"> </body>
</span><span class="cx">
</span></span></pre></div>
<a id="trunkLayoutTestshttptestscontentextensionshideonpinghtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/contentextensions/hide-on-ping.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/contentextensions/hide-on-ping.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/contentextensions/hide-on-ping.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -36,6 +36,6 @@
</span><span class="cx"> <img src="resources/delete-ping.php?test=contentextensions-hide-on-ping" onerror="clickOnLinkWithPing();">
</span><span class="cx"> <a id="a" href="#a" ping="resources/save-ping.php?test=contentextensions-hide-on-ping" onclick="showPingResult();">Link with ping</a>
</span><span class="cx"> </div>
</span><del>-<iframe id="result_frame"><!-- Will contain ping data received by server --></iframe>
</del><ins>+<iframe id="result_frame" name="result_frame"><!-- Will contain ping data received by server --></iframe>
</ins><span class="cx"> </body>
</span><span class="cx">
</span></span></pre></div>
<a id="trunkLayoutTestshttptestsloadingredirectmethodshtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/loading/redirect-methods.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/loading/redirect-methods.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/loading/redirect-methods.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -21,6 +21,7 @@
</span><span class="cx"> var iframe = document.createElement("iframe");
</span><span class="cx"> iframe.setAttribute("testCode", testCodes[index]);
</span><span class="cx"> iframe.setAttribute("id", index);
</span><ins>+ iframe.setAttribute("name", index);
</ins><span class="cx"> iframe.setAttribute("height", "90px");
</span><span class="cx"> document.body.appendChild(iframe);
</span><span class="cx"> iframe.src="resources/redirect-methods-form.html";
</span></span></pre></div>
<a id="trunkLayoutTestshttptestsloadingtextcontenttypewithbinaryextensionhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/loading/text-content-type-with-binary-extension.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/loading/text-content-type-with-binary-extension.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/loading/text-content-type-with-binary-extension.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -42,5 +42,5 @@
</span><span class="cx"> <p id="result">
</span><span class="cx"> Test running...
</span><span class="cx"> </p>
</span><del>- <iframe id="iframe" src="resources/binaryData.sitx" onload="iframeLoaded()"></iframe>
</del><ins>+ <iframe id="iframe" name="iframe" src="resources/binaryData.sitx" onload="iframeLoaded()"></iframe>
</ins><span class="cx"> </body>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestsmisclocationreplacecrossdomainhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/misc/location-replace-crossdomain.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/misc/location-replace-crossdomain.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/misc/location-replace-crossdomain.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -14,7 +14,7 @@
</span><span class="cx"> </script>
</span><span class="cx"> </head>
</span><span class="cx"> <body onload="test();">
</span><del>-<iframe id="crossDomainFrame" src="http://localhost:8000/misc/resources/failure.html"></iframe>
</del><ins>+<iframe id="crossDomainFrame" name="crossDomainFrame" src="http://localhost:8000/misc/resources/failure.html"></iframe>
</ins><span class="cx"> </body>
</span><span class="cx"> </html>
</span><span class="cx"> <!--
</span></span></pre></div>
<a id="trunkLayoutTestshttptestsmultipartmultipartwaitbeforeboundaryhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/multipart/multipart-wait-before-boundary.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/multipart/multipart-wait-before-boundary.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/multipart/multipart-wait-before-boundary.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -18,6 +18,6 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p id="status">RUNNING...</p>
</span><del>- <iframe id="iframe" src="resources/multipart-wait-before-boundary.php">
</del><ins>+ <iframe id="iframe" name="iframe" src="resources/multipart-wait-before-boundary.php">
</ins><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestsnavigationnoreferrersubframehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/navigation/no-referrer-subframe.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/navigation/no-referrer-subframe.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/navigation/no-referrer-subframe.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -1,7 +1,7 @@
</span><span class="cx"> <html><body>
</span><span class="cx"> This tests behavior of "noreferrer" links in subframes. A referrer should not be sent and window.opener should remain null.<br/>
</span><span class="cx"> <a id="link" href="resources/no-referrer-helper.php" rel="noreferrer" target="subframe">Load subframe</a>
</span><del>-<iframe id="subframe" src="about:blank"></iframe>
</del><ins>+<iframe id="subframe" name="subframe" src="about:blank"></iframe>
</ins><span class="cx"> <script>
</span><span class="cx"> window.name = "consoleWindow";
</span><span class="cx"> if (window.testRunner) {
</span></span></pre></div>
<a id="trunkLayoutTestshttptestsnavigationresourcesforwardandcancelframeshtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/navigation/resources/forward-and-cancel-frames.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/navigation/resources/forward-and-cancel-frames.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/navigation/resources/forward-and-cancel-frames.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -9,7 +9,7 @@
</span><span class="cx"> }
</span><span class="cx"> </script>
</span><span class="cx"> <!-- Child iframe -->
</span><del>-<iframe id="frame1" src="about:blank"></iframe>
</del><ins>+<iframe id="frame1" name="frame1" src="about:blank"></iframe>
</ins><span class="cx"> <br>
</span><span class="cx"> <p>This test checks that the backForward list is not corrupted when a frame load is canceled.
</span><span class="cx"> <p>If testing manually, <a id="link" href="slow-resource.pl?delay=250" target="frame1">click here</a> and then Back. Then click Forward and quickly click Stop. Ensure that Back and Forward still work.
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecuritycrossframeaccesschildexplicitdomainhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/cross-frame-access-child-explicit-domain.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/cross-frame-access-child-explicit-domain.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/cross-frame-access-child-explicit-domain.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -3,7 +3,7 @@
</span><span class="cx"> <script src="resources/cross-frame-access.js"></script>
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><del>-<iframe id="aFrame"></iframe>
</del><ins>+<iframe id="aFrame" name="aFrame"></iframe>
</ins><span class="cx"> <pre id="console"></pre>
</span><span class="cx"> <script>
</span><span class="cx"> var url = "http://127.0.0.1:8000/security/resources/cross-frame-iframe-with-explicit-domain-set.html";
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecuritycrossframeaccessdocumentdirecthtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/cross-frame-access-document-direct.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/cross-frame-access-document-direct.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/cross-frame-access-document-direct.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -19,6 +19,6 @@
</span><span class="cx"> </script>
</span><span class="cx"> <body>
</span><span class="cx"> <p>Test cross-origin direct document access.</p>
</span><del>- <iframe id="theFrame" src="resources/cross-frame-iframe-for-document-direct-test.html"></iframe>
</del><ins>+ <iframe id="theFrame" name="theFrame" src="resources/cross-frame-iframe-for-document-direct-test.html"></iframe>
</ins><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecuritycrossframeaccessparentexplicitdomainhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/cross-frame-access-parent-explicit-domain.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/cross-frame-access-parent-explicit-domain.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/cross-frame-access-parent-explicit-domain.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -3,7 +3,7 @@
</span><span class="cx"> <script src="resources/cross-frame-access.js"></script>
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><del>-<iframe id="aFrame"></iframe>
</del><ins>+<iframe id="aFrame" name="aFrame"></iframe>
</ins><span class="cx"> <pre id="console"></pre>
</span><span class="cx"> <script>
</span><span class="cx"> // Explicitly set the domain.
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecuritycrossframeaccessportexplicitdomainhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/cross-frame-access-port-explicit-domain.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/cross-frame-access-port-explicit-domain.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/cross-frame-access-port-explicit-domain.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -4,7 +4,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>This test currently fails because we check the port and protocol even if document.domain is explicitly set (rdar://problem/5366437).</p>
</span><del>-<iframe id="aFrame"></iframe>
</del><ins>+<iframe id="aFrame" name="aFrame"></iframe>
</ins><span class="cx"> <pre id="console"></pre>
</span><span class="cx"> <script>
</span><span class="cx"> // Explicitly set the domain.
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecuritycrossframeaccessporthtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/cross-frame-access-port.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/cross-frame-access-port.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/cross-frame-access-port.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -3,7 +3,7 @@
</span><span class="cx"> <script src="resources/cross-frame-access.js"></script>
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><del>-<iframe id="aFrame"></iframe>
</del><ins>+<iframe id="aFrame" name="aFrame"></iframe>
</ins><span class="cx"> <pre id="console"></pre>
</span><span class="cx"> <script>
</span><span class="cx"> var url = "http://127.0.0.1:8080/security/resources/cross-frame-iframe.html";
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecuritycrossframeaccessprotocolexplicitdomainhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/cross-frame-access-protocol-explicit-domain.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/cross-frame-access-protocol-explicit-domain.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/cross-frame-access-protocol-explicit-domain.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -4,7 +4,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>This test currently fails because we check the port and protocol even if document.domain is explicitly set (rdar://problem/5366437).</p>
</span><del>-<iframe id="aFrame"></iframe>
</del><ins>+<iframe id="aFrame" name="aFrame"></iframe>
</ins><span class="cx"> <pre id="console"></pre>
</span><span class="cx"> <script>
</span><span class="cx"> // Explicitly set the domain.
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecuritycrossframeaccessprotocolhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/cross-frame-access-protocol.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/cross-frame-access-protocol.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/cross-frame-access-protocol.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -3,7 +3,7 @@
</span><span class="cx"> <script src="resources/cross-frame-access.js"></script>
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><del>-<iframe id="aFrame"></iframe>
</del><ins>+<iframe id="aFrame" name="aFrame"></iframe>
</ins><span class="cx"> <pre id="console"></pre>
</span><span class="cx"> <script>
</span><span class="cx"> var url = "https://127.0.0.1:8443/security/resources/cross-frame-iframe.html";
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecuritydataURLresourcesforeigndomaindataurlaccesseeiframehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/dataURL/resources/foreign-domain-data-url-accessee-iframe.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/dataURL/resources/foreign-domain-data-url-accessee-iframe.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/dataURL/resources/foreign-domain-data-url-accessee-iframe.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -1,7 +1,7 @@
</span><span class="cx"> <html>
</span><span class="cx"> <body>
</span><span class="cx"> <p>Inner iframe on a foreign domain.</p>
</span><del>- <iframe id="aFrame"></iframe>
</del><ins>+ <iframe id="aFrame" name="aFrame"></iframe>
</ins><span class="cx"> <script>
</span><span class="cx"> var url = "data:text/html,<html>"
</span><span class="cx"> + "<head>"
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecuritydataURLresourcesforeigndomaindataurlaccessoriframehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/dataURL/resources/foreign-domain-data-url-accessor-iframe.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/dataURL/resources/foreign-domain-data-url-accessor-iframe.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/dataURL/resources/foreign-domain-data-url-accessor-iframe.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -1,7 +1,7 @@
</span><span class="cx"> <html>
</span><span class="cx"> <body>
</span><span class="cx"> <p>Inner iframe on a foreign domain.</p>
</span><del>-<iframe id="aFrame"></iframe>
</del><ins>+<iframe id="aFrame" name="aFrame"></iframe>
</ins><span class="cx"> <script>
</span><span class="cx"> window.onload = function() {
</span><span class="cx"> var url = "data:text/html,<html>"
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecuritydataURLxssDENIEDfromdataurlinforeigndomainsubframehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-from-data-url-in-foreign-domain-subframe.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-from-data-url-in-foreign-domain-subframe.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-from-data-url-in-foreign-domain-subframe.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -13,6 +13,6 @@
</span><span class="cx"> is an iframe which loads a data: URL. This tests that the data: URL loaded iframe does not have access
</span><span class="cx"> to the main frame using top.document.</p>
</span><span class="cx"> <p id='accessMe'>Pass: Cross frame access from a data: URL on a different domain was denied.</p>
</span><del>- <iframe id='aFrame' src="http://localhost:8000/security/dataURL/resources/foreign-domain-data-url-accessor-iframe.html" style="width: 400px; height:200px;"></iframe>
</del><ins>+ <iframe id='aFrame' name="aFrame" src="http://localhost:8000/security/dataURL/resources/foreign-domain-data-url-accessor-iframe.html" style="width: 400px; height:200px;"></iframe>
</ins><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecuritydataURLxssDENIEDfromdataurlsubframe2levelhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-from-data-url-sub-frame-2-level.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-from-data-url-sub-frame-2-level.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-from-data-url-sub-frame-2-level.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -39,7 +39,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body onload="loaded();">
</span><span class="cx"> <p>This tests that a data: URL loaded in an iframe inside another data: URL loaded iframe doesn't have access to the main frame.</p>
</span><del>- <iframe id="aFrame" style="width: 500px; height: 300px;"></iframe>
</del><ins>+ <iframe id="aFrame" name="aFrame" style="width: 500px; height: 300px;"></iframe>
</ins><span class="cx"> <p id='accessMe'>PASS: Cross frame access from a data: URL inside another data: URL was denied.</p>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecuritydataURLxssDENIEDfromdataurlsubframehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-from-data-url-sub-frame.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-from-data-url-sub-frame.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-from-data-url-sub-frame.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -33,7 +33,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body onload="loaded();">
</span><span class="cx"> <p>This tests that a data: URL loaded in an iframe doesn't have access to its parent's frame</p>
</span><del>- <iframe id="aFrame"></iframe>
</del><ins>+ <iframe id="aFrame" name="aFrame"></iframe>
</ins><span class="cx"> <p id='accessMe'>PASS: Cross frame access from a data: URL was denied.</p>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecuritydataURLxssDENIEDfromdataurltodataurlhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-from-data-url-to-data-url.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-from-data-url-to-data-url.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-from-data-url-to-data-url.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -60,7 +60,7 @@
</span><span class="cx"> + "</scr" + "ipt>"
</span><span class="cx"> + "</head>"
</span><span class="cx"> + "<body onload='loaded();'>"
</span><del>- + "<iframe id='inner'></iframe>"
</del><ins>+ + "<iframe id='inner' name='inner'></iframe>"
</ins><span class="cx"> + "<p>Inner iframe.</p>"
</span><span class="cx"> + "<button onclick='performTest();'>Test</button>"
</span><span class="cx"> + "<pre id='console'></pre>"
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecuritydataURLxssDENIEDtodataurlfromdataurlhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-to-data-url-from-data-url.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-to-data-url-from-data-url.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-to-data-url-from-data-url.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -43,6 +43,6 @@
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that a data: URL loaded in an iframe inside another data: URL loaded iframe doesn't have access to its parent, the
</span><span class="cx"> first data: URL loaded iframe.</p>
</span><del>- <iframe id="aFrame" style="width: 500px; height: 300px;"></iframe>
</del><ins>+ <iframe id="aFrame" name="aFrame" style="width: 500px; height: 300px;"></iframe>
</ins><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecuritydataURLxssDENIEDtodataurlsubframe2levelhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-to-data-url-sub-frame-2-level.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-to-data-url-sub-frame-2-level.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-to-data-url-sub-frame-2-level.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -71,7 +71,7 @@
</span><span class="cx"> <body onload="loaded();">
</span><span class="cx"> <p>This tests that the main frame doesn't have access to a data: URL loaded in an iframe inside another data: URL loaded iframe.</p>
</span><span class="cx"> <button onclick="performTest()">Test</button>
</span><del>- <iframe id="aFrame" style="width: 500px; height: 300px;"></iframe>
</del><ins>+ <iframe id="aFrame" name="aFrame" style="width: 500px; height: 300px;"></iframe>
</ins><span class="cx"> <pre id='console'></pre>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecuritydataURLxssDENIEDtodataurlsubframeuppercasehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-to-data-url-sub-frame-uppercase.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-to-data-url-sub-frame-uppercase.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-to-data-url-sub-frame-uppercase.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -5,7 +5,7 @@
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that the main frame can't access the contents of an iframe that contains a data: URL loaded page using the
</span><span class="cx"> uppercased variant DATA:</p>
</span><del>- <iframe id="aFrame"></iframe>
</del><ins>+ <iframe id="aFrame" name="aFrame"></iframe>
</ins><span class="cx"> <pre id="console"></pre>
</span><span class="cx"> <script>
</span><span class="cx"> var url = "DATA:text/html,<html><scr" + "ipt>onload = function() { parent.postMessage(\'LOADED\', \'*\'); } </scr" + "ipt><body><p id=\'accessMe\'></p><p>Inner iframe.</p></body></html>";
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecuritydataURLxssDENIEDtodataurlsubframehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-to-data-url-sub-frame.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-to-data-url-sub-frame.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/dataURL/xss-DENIED-to-data-url-sub-frame.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -4,7 +4,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that the main frame can't access the contents of an iframe that contains a data: URL loaded page</p>
</span><del>- <iframe id="aFrame"></iframe>
</del><ins>+ <iframe id="aFrame" name="aFrame"></iframe>
</ins><span class="cx"> <pre id="console"></pre>
</span><span class="cx"> <script>
</span><span class="cx"> var url = "data:text/html,<html><scr" + "ipt>onload = function() { parent.postMessage(\'LOADED\', \'*\'); } </scr" + "ipt><body><p id=\'accessMe\'></p><p>Inner iframe.</p></body></html>";
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityhostcomparecaseinsensitivehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/host-compare-case-insensitive.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/host-compare-case-insensitive.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/host-compare-case-insensitive.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -10,7 +10,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that the comparison of the host for security is done case insensitive.</p>
</span><del>- <iframe id="frameA" src="http://localhost:8000/security/resources/cross-frame-iframe.html"></iframe>
- <iframe id="frameB" src="http://LOCALHOST:8000/security/resources/localhost-accesssor.html"></iframe>
</del><ins>+ <iframe id="frameA" name="frameA" src="http://localhost:8000/security/resources/cross-frame-iframe.html"></iframe>
+ <iframe id="frameB" name="frameB" src="http://LOCALHOST:8000/security/resources/localhost-accesssor.html"></iframe>
</ins><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextframelocationhtmldomhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-location-htmldom.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-location-htmldom.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-location-htmldom.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -38,7 +38,7 @@
</span><span class="cx"> </script>
</span><span class="cx"> </head>
</span><span class="cx"> <frameset rows="10%,*">
</span><del>- <frame id='main' src="data:text/html,<p>This test passes as long as the word 'FAIL' and an accompanying message do not appear in the frame below.</p>">
- <frame id='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'>
</del><ins>+ <frame id='main' name='main' src="data:text/html,<p>This test passes as long as the word 'FAIL' and an accompanying message do not appear in the frame below.</p>">
+ <frame id='aFrame' name='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'>
</ins><span class="cx"> </frameset>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextframesrcgetAttributevaluehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-getAttribute-value.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-getAttribute-value.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-getAttribute-value.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -40,7 +40,7 @@
</span><span class="cx"> </script>
</span><span class="cx"> </head>
</span><span class="cx"> <frameset rows="10%,*">
</span><del>- <frame id='main' src="data:text/html,<p>This test passes as long as the word 'FAIL' and an accompanying message do not appear in the frame below.</p>">
- <frame id='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'>
</del><ins>+ <frame id='main' name='main' src="data:text/html,<p>This test passes as long as the word 'FAIL' and an accompanying message do not appear in the frame below.</p>">
+ <frame id='aFrame' name='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'>
</ins><span class="cx"> </frameset>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextframesrchtmldomhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-htmldom.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-htmldom.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-htmldom.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -38,7 +38,7 @@
</span><span class="cx"> </script>
</span><span class="cx"> </head>
</span><span class="cx"> <frameset rows="10%,*">
</span><del>- <frame id='main' src="data:text/html,<p>This test passes as long as the word 'FAIL' and an accompanying message do not appear in the frame below.</p>">
- <frame id='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'>
</del><ins>+ <frame id='main' name='main' src="data:text/html,<p>This test passes as long as the word 'FAIL' and an accompanying message do not appear in the frame below.</p>">
+ <frame id='aFrame' name='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'>
</ins><span class="cx"> </frameset>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextframesrcsetAttributehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttribute.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttribute.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttribute.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -38,7 +38,7 @@
</span><span class="cx"> </script>
</span><span class="cx"> </head>
</span><span class="cx"> <frameset rows="10%,*">
</span><del>- <frame id='main' src="data:text/html,<p>This test passes as long as the word 'FAIL' and an accompanying message do not appear in the frame below.</p>">
- <frame id='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'>
</del><ins>+ <frame id='main' name='main' src="data:text/html,<p>This test passes as long as the word 'FAIL' and an accompanying message do not appear in the frame below.</p>">
+ <frame id='aFrame' name='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'>
</ins><span class="cx"> </frameset>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextframesrcsetAttributeNShtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttributeNS.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttributeNS.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttributeNS.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -38,7 +38,7 @@
</span><span class="cx"> </script>
</span><span class="cx"> </head>
</span><span class="cx"> <frameset rows="10%,*">
</span><del>- <frame id='main' src="data:text/html,<p>This test passes as long as the word 'FAIL' and an accompanying message do not appear in the frame below.</p>">
- <frame id='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'>
</del><ins>+ <frame id='main' name='main' src="data:text/html,<p>This test passes as long as the word 'FAIL' and an accompanying message do not appear in the frame below.</p>">
+ <frame id='aFrame' name='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'>
</ins><span class="cx"> </frameset>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextframesrcsetAttributeNodehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttributeNode.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttributeNode.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttributeNode.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -44,7 +44,7 @@
</span><span class="cx"> </script>
</span><span class="cx"> </head>
</span><span class="cx"> <frameset rows="10%,*">
</span><del>- <frame id='main' src="data:text/html,<p>This test passes as long as the word 'FAIL' and an accompanying message do not appear in the frame below.</p>">
- <frame id='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'>
</del><ins>+ <frame id='main' name='main' src="data:text/html,<p>This test passes as long as the word 'FAIL' and an accompanying message do not appear in the frame below.</p>">
+ <frame id='aFrame' name='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'>
</ins><span class="cx"> </frameset>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextframesrcsetAttributeNodeNShtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttributeNodeNS.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttributeNodeNS.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-frame-src-setAttributeNodeNS.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -44,7 +44,7 @@
</span><span class="cx"> </script>
</span><span class="cx"> </head>
</span><span class="cx"> <frameset rows="10%,*">
</span><del>- <frame id='main' src="data:text/html,<p>This test passes as long as the word 'FAIL' and an accompanying message do not appear in the frame below.</p>">
- <frame id='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'>
</del><ins>+ <frame id='main' name='main' src="data:text/html,<p>This test passes as long as the word 'FAIL' and an accompanying message do not appear in the frame below.</p>">
+ <frame id='aFrame' name='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'>
</ins><span class="cx"> </frameset>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextiframesrcgetAttributevaluehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-getAttribute-value.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-getAttribute-value.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-getAttribute-value.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -46,6 +46,6 @@
</span><span class="cx"> <body>
</span><span class="cx"> <p>This test passes as long as the word 'FAIL' and an accompanying message do not appear in the subframe.</p>
</span><span class="cx"> <pre id='console'></pre>
</span><del>- <iframe id='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'></iframe>
</del><ins>+ <iframe id='aFrame' name='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'></iframe>
</ins><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextiframesrchtmldomhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-htmldom.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-htmldom.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-htmldom.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -45,6 +45,6 @@
</span><span class="cx"> <body>
</span><span class="cx"> <p>This test passes as long as the word 'FAIL' and an accompanying message do not appear in the subframe.</p>
</span><span class="cx"> <pre id='console'></pre>
</span><del>- <iframe id='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'></iframe>
</del><ins>+ <iframe id='aFrame' name='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'></iframe>
</ins><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextiframesrcsetAttributehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttribute.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttribute.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttribute.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -45,6 +45,6 @@
</span><span class="cx"> <body>
</span><span class="cx"> <p>This test passes as long as the word 'FAIL' and an accompanying message do not appear in the subframe.</p>
</span><span class="cx"> <pre id='console'></pre>
</span><del>- <iframe id='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'></iframe>
</del><ins>+ <iframe id='aFrame' name='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'></iframe>
</ins><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextiframesrcsetAttributeNShtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttributeNS.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttributeNS.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttributeNS.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -45,6 +45,6 @@
</span><span class="cx"> <body>
</span><span class="cx"> <p>This test passes as long as the word 'FAIL' and an accompanying message do not appear in the subframe.</p>
</span><span class="cx"> <pre id='console'></pre>
</span><del>- <iframe id='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'></iframe>
</del><ins>+ <iframe id='aFrame' name='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'></iframe>
</ins><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextiframesrcsetAttributeNodehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttributeNode.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttributeNode.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttributeNode.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -51,6 +51,6 @@
</span><span class="cx"> <body>
</span><span class="cx"> <p>This test passes as long as the word 'FAIL' and an accompanying message do not appear in the subframe.</p>
</span><span class="cx"> <pre id='console'></pre>
</span><del>- <iframe id='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'></iframe>
</del><ins>+ <iframe id='aFrame' name='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'></iframe>
</ins><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityjavascriptURLjavascriptURLexecutioncontextiframesrcsetAttributeNodeNShtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttributeNodeNS.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttributeNodeNS.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/javascriptURL/javascriptURL-execution-context-iframe-src-setAttributeNodeNS.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -51,6 +51,6 @@
</span><span class="cx"> <body>
</span><span class="cx"> <p>This test passes as long as the word 'FAIL' and an accompanying message do not appear in the subframe.</p>
</span><span class="cx"> <pre id='console'></pre>
</span><del>- <iframe id='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'></iframe>
</del><ins>+ <iframe id='aFrame' name='aFrame' src='http://localhost:8000/security/resources/cross-frame-iframe.html'></iframe>
</ins><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityjavascriptURLresourcesforeigndomainjavascripturlaccesseeiframehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/javascriptURL/resources/foreign-domain-javascript-url-accessee-iframe.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/javascriptURL/resources/foreign-domain-javascript-url-accessee-iframe.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/javascriptURL/resources/foreign-domain-javascript-url-accessee-iframe.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -1,7 +1,7 @@
</span><span class="cx"> <html>
</span><span class="cx"> <body>
</span><span class="cx"> <p>Inner iframe on a foreign domain.</p>
</span><del>- <iframe id="aFrame"></iframe>
</del><ins>+ <iframe id="aFrame" name="aFrame"></iframe>
</ins><span class="cx"> <script>
</span><span class="cx"> var url = "javascript:\"<html>"
</span><span class="cx"> + "<head>"
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityjavascriptURLresourcesforeigndomainjavascripturlaccessoriframehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/javascriptURL/resources/foreign-domain-javascript-url-accessor-iframe.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/javascriptURL/resources/foreign-domain-javascript-url-accessor-iframe.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/javascriptURL/resources/foreign-domain-javascript-url-accessor-iframe.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -1,7 +1,7 @@
</span><span class="cx"> <html>
</span><span class="cx"> <body>
</span><span class="cx"> <p>Inner iframe on a foreign domain.</p>
</span><del>- <iframe id="aFrame"></iframe>
</del><ins>+ <iframe id="aFrame" name="aFrame"></iframe>
</ins><span class="cx"> <script>
</span><span class="cx"> var url = "javascript:\"<html>"
</span><span class="cx"> + "<head>"
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityjavascriptURLxssALLOWEDfromjavascripturlsubframe2levelhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/javascriptURL/xss-ALLOWED-from-javascript-url-sub-frame-2-level.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/javascriptURL/xss-ALLOWED-from-javascript-url-sub-frame-2-level.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/javascriptURL/xss-ALLOWED-from-javascript-url-sub-frame-2-level.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -1,7 +1,7 @@
</span><span class="cx"> <html>
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that a javascript: URL loaded in an iframe inside another javascript: URL loaded iframe has access to the main frame.</p>
</span><del>- <iframe id="aFrame" style="width: 500px; height: 300px;"></iframe>
</del><ins>+ <iframe id="aFrame" name='aFrame' style="width: 500px; height: 300px;"></iframe>
</ins><span class="cx"> <p id='accessMe'>FAIL: Cross frame access from a javascript: URL inside another javascript: URL was denied.</p>
</span><span class="cx"> <script>
</span><span class="cx"> if (window.testRunner) {
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityjavascriptURLxssALLOWEDfromjavascripturlsubframehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/javascriptURL/xss-ALLOWED-from-javascript-url-sub-frame.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/javascriptURL/xss-ALLOWED-from-javascript-url-sub-frame.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/javascriptURL/xss-ALLOWED-from-javascript-url-sub-frame.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -1,7 +1,7 @@
</span><span class="cx"> <html>
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that a javascript: URL loaded in an iframe has access to its parent's frame</p>
</span><del>- <iframe id="aFrame"></iframe>
</del><ins>+ <iframe id="aFrame" name="aFrame"></iframe>
</ins><span class="cx"> <p id='accessMe'>FAIL: Cross frame access from a javascript: URL was denied.</p>
</span><span class="cx"> <script>
</span><span class="cx"> if (window.testRunner) {
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityjavascriptURLxssALLOWEDtojavascripturlfromjavscripturlhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/javascriptURL/xss-ALLOWED-to-javascript-url-from-javscript-url.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/javascriptURL/xss-ALLOWED-to-javascript-url-from-javscript-url.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/javascriptURL/xss-ALLOWED-to-javascript-url-from-javscript-url.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -2,7 +2,7 @@
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that a javascript: URL loaded in an iframe inside another javascript: URL loaded iframe has access to it's parent, the
</span><span class="cx"> first javascript: URL loaded iframe.</p>
</span><del>- <iframe id="aFrame" style="width: 500px; height: 300px;"></iframe>
</del><ins>+ <iframe id="aFrame" name="aFrame" style="width: 500px; height: 300px;"></iframe>
</ins><span class="cx"> <script>
</span><span class="cx"> if (window.testRunner) {
</span><span class="cx"> testRunner.dumpAsText();
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityjavascriptURLxssALLOWEDtojavascripturlsubframe2levelhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/javascriptURL/xss-ALLOWED-to-javascript-url-sub-frame-2-level.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/javascriptURL/xss-ALLOWED-to-javascript-url-sub-frame-2-level.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/javascriptURL/xss-ALLOWED-to-javascript-url-sub-frame-2-level.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -70,7 +70,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that the main frame has access to a javascript: URL loaded in an iframe inside another javascript: URL loaded iframe.</p>
</span><del>- <iframe id="aFrame" style="width: 500px; height: 300px;"></iframe>
</del><ins>+ <iframe id="aFrame" name="aFrame" style="width: 500px; height: 300px;"></iframe>
</ins><span class="cx"> <pre id='console'></pre>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityjavascriptURLxssALLOWEDtojavascripturlsubframehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/javascriptURL/xss-ALLOWED-to-javascript-url-sub-frame.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/javascriptURL/xss-ALLOWED-to-javascript-url-sub-frame.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/javascriptURL/xss-ALLOWED-to-javascript-url-sub-frame.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -4,7 +4,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that the main frame can access the contents of an iframe that contains a javascript: URL loaded page</p>
</span><del>- <iframe id="aFrame"></iframe>
</del><ins>+ <iframe id="aFrame" name="aFrame"></iframe>
</ins><span class="cx"> <pre id="console"></pre>
</span><span class="cx"> <script>
</span><span class="cx"> var url = "javascript:\"<html><scr" + "ipt>onload = function() { parent.postMessage(\'LOADED\', \'*\'); } </scr" + "ipt><body><p id=\'accessMe\'></p><p>Inner iframe.</p></body></html>\"";
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityprotocolcomparecaseinsensitivehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/protocol-compare-case-insensitive.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/protocol-compare-case-insensitive.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/protocol-compare-case-insensitive.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -3,7 +3,7 @@
</span><span class="cx"> <script src="resources/cross-frame-access.js"></script>
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><del>-<iframe id="aFrame"></iframe>
</del><ins>+<iframe id="aFrame" name="aFrame"></iframe>
</ins><span class="cx"> <pre id="console"></pre>
</span><span class="cx"> <script>
</span><span class="cx"> var url = "HTTP://127.0.0.1:8000/security/resources/cross-frame-iframe.html";
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityreferrerpolicyredirectlinkhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/referrer-policy-redirect-link.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/referrer-policy-redirect-link.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/referrer-policy-redirect-link.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -20,6 +20,6 @@
</span><span class="cx"> This test checks the referrer policy is obeyed along the redirect chain. The
</span><span class="cx"> test passes if the referrer is https://127.0.0.1:8443
</span><span class="cx"> </p>
</span><del>-<iframe id="iframe" onload="runTest()" src="https://127.0.0.1:8443/security/resources/referrer-policy-redirect-link.html"></iframe>
</del><ins>+<iframe id="iframe" name="iframe" onload="runTest()" src="https://127.0.0.1:8443/security/resources/referrer-policy-redirect-link.html"></iframe>
</ins><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecuritysandboxediframeblocksaccessfromparenthtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/sandboxed-iframe-blocks-access-from-parent.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/sandboxed-iframe-blocks-access-from-parent.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/sandboxed-iframe-blocks-access-from-parent.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -19,6 +19,6 @@
</span><span class="cx"> containing document shouldn't have script access to. This test passes if a
</span><span class="cx"> console warning is generated, noting the access violation.</p>
</span><span class="cx">
</span><del>- <iframe src="resources/blank.html" id="testframe" sandbox onload="test();"></iframe>
</del><ins>+ <iframe src="resources/blank.html" id="testframe" name="testframe" sandbox onload="test();"></iframe>
</ins><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecuritysrcdocinheritsreferrerforformshtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/srcdoc-inherits-referrer-for-forms.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/srcdoc-inherits-referrer-for-forms.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/srcdoc-inherits-referrer-for-forms.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -8,8 +8,8 @@
</span><span class="cx"> The srcdoc iframe below should use this document's URL as its referrer.
</span><span class="cx"> <iframe srcdoc="
</span><span class="cx"> This iframe logs information about its referrer:<br>
</span><del>-<iframe id='tg'></iframe>
-<form target='tg' id='fm' method='GET' action='resources/referrer-policy-log.php'></form>
</del><ins>+<iframe id='tg' name='tg'></iframe>
+<form target='tg' id='fm' name='fm' method='GET' action='resources/referrer-policy-log.php'></form>
</ins><span class="cx"> <script>
</span><span class="cx"> document.getElementById('tg').addEventListener('load', function() {
</span><span class="cx"> if (window.testRunner)
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditorfullblockbasehrefhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/full-block-base-href.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/full-block-base-href.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/full-block-base-href.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -13,7 +13,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>There should be no content in the iframe below:</p>
</span><del>-<iframe id="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-head-base-href.pl?enable-full-block=1&q=<base href='http://localhost:8000/security/xssAuditor/resources/base-href/'>">
</del><ins>+<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-head-base-href.pl?enable-full-block=1&q=<base href='http://localhost:8000/security/xssAuditor/resources/base-href/'>">
</ins><span class="cx"> </iframe>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditorfullblockiframejavascripturlhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/full-block-iframe-javascript-url.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/full-block-iframe-javascript-url.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/full-block-iframe-javascript-url.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -13,7 +13,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>There should be no content in the iframe below:</p>
</span><del>-<iframe id="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src='http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/full-block-iframe-javascript-url.html&enable-full-block=1&q=%3Ciframe%20src=javascript:alert(document.domain)%3E'>
</del><ins>+<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src='http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/full-block-iframe-javascript-url.html&enable-full-block=1&q=%3Ciframe%20src=javascript:alert(document.domain)%3E'>
</ins><span class="cx"> </iframe>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditorfullblockiframenoinheritphp"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/full-block-iframe-no-inherit.php (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/full-block-iframe-no-inherit.php        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/full-block-iframe-no-inherit.php        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -16,7 +16,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that the header X-XSS-Protection is not inherited by the iframe below:</p>
</span><del>-<iframe id="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/full-block-iframe-no-inherit.html&q=<script>alert(/XSS/)</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</del><ins>+<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/full-block-iframe-no-inherit.html&q=<script>alert(/XSS/)</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</ins><span class="cx"> </iframe>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditorfullblockjavascriptlinkhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/full-block-javascript-link.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/full-block-javascript-link.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/full-block-javascript-link.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -13,7 +13,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>There should be no content in the iframe below:</p>
</span><del>-<iframe id="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src='http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?enable-full-block=1&elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3Djavascript%3Aalert%280%29%3Etest%3C/a%3E'>
</del><ins>+<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src='http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag-click-and-notify.pl?enable-full-block=1&elmid=anchorLink&q=%3Ca+id%3DanchorLink+href%3Djavascript%3Aalert%280%29%3Etest%3C/a%3E'>
</ins><span class="cx"> </iframe>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditorfullblocklinkonclickhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/full-block-link-onclick.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/full-block-link-onclick.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/full-block-link-onclick.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -13,7 +13,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>There should be no content in the iframe below:</p>
</span><del>-<iframe id="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/full-block-link-onclick.html&enable-full-block=1&q=<a%20onclick='alert(String.fromCharCode(0x58,0x53,0x53))'>Click</a>">
</del><ins>+<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/full-block-link-onclick.html&enable-full-block=1&q=<a%20onclick='alert(String.fromCharCode(0x58,0x53,0x53))'>Click</a>">
</ins><span class="cx"> </iframe>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditorfullblockobjecttaghtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/full-block-object-tag.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/full-block-object-tag.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/full-block-object-tag.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -13,7 +13,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>There should be no content in the iframe below:</p>
</span><del>-<iframe id="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/full-block-object-tag.html&enable-full-block=1&q=<object name='plugin' type='application/x-webkit-test-netscape'><param name='movie' value='http://localhost:8000/security/xssAuditor/resources/dummy.swf' /></object>">
</del><ins>+<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/full-block-object-tag.html&enable-full-block=1&q=<object name='plugin' type='application/x-webkit-test-netscape'><param name='movie' value='http://localhost:8000/security/xssAuditor/resources/dummy.swf' /></object>">
</ins><span class="cx"> </iframe>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditorfullblockscripttagcrossdomainhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/full-block-script-tag-cross-domain.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/full-block-script-tag-cross-domain.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/full-block-script-tag-cross-domain.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -22,7 +22,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>There should be no content in the iframe below:</p>
</span><del>-<iframe id="frame" onload="checkframe()" src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/full-block-script-tag-cross-domain.html&enable-full-block=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script>">
</del><ins>+<iframe id="frame" name="frame" onload="checkframe()" src="http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/full-block-script-tag-cross-domain.html&enable-full-block=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script>">
</ins><span class="cx"> </iframe>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditorfullblockscripttagwithsourcehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/full-block-script-tag-with-source.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/full-block-script-tag-with-source.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/full-block-script-tag-with-source.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -13,7 +13,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>There should be no content in the iframe below:</p>
</span><del>-<iframe id="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/full-block-script-tag-with-source.html&enable-full-block=1&q=<script src='http://localhost:8000/security/xssAuditor/resources/xss.js'></script>">
</del><ins>+<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/full-block-script-tag-with-source.html&enable-full-block=1&q=<script src='http://localhost:8000/security/xssAuditor/resources/xss.js'></script>">
</ins><span class="cx"> </iframe>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditorfullblockscripttaghtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/full-block-script-tag.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/full-block-script-tag.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/full-block-script-tag.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -22,7 +22,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>There should be no content in the iframe below:</p>
</span><del>-<iframe id="frame" onload="checkframe()" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/full-block-script-tag.html&enable-full-block=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script>">
</del><ins>+<iframe id="frame" name="frame" onload="checkframe()" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/full-block-script-tag.html&enable-full-block=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script>">
</ins><span class="cx"> </iframe>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditormalformedxssprotectionheader1html"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-1.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-1.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-1.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -13,7 +13,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that a malformed X-XSS-Protection header is not ignored when the length of its value exceeds <a href="https://bugs.webkit.org/show_bug.cgi?id=27312#c13">16 characters, and that an error is reported.</a></p>
</span><del>-<iframe id="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/malformed-xss-protection-header-1.html&notifyDone=1&malformed-header=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</del><ins>+<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/malformed-xss-protection-header-1.html&notifyDone=1&malformed-header=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</ins><span class="cx"> </iframe>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditormalformedxssprotectionheader2html"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-2.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-2.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-2.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -13,7 +13,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that the X-XSS-Protection header is not ignored when the first character is not 0 or 1, and that we issue an error.</p>
</span><del>-<iframe id="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/malformed-xss-protection-header-2.html&notifyDone=1&malformed-header=2&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</del><ins>+<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/malformed-xss-protection-header-2.html&notifyDone=1&malformed-header=2&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</ins><span class="cx"> </iframe>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditormalformedxssprotectionheader3html"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-3.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-3.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-3.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -13,7 +13,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that a malformed X-XSS-Protection header is not ignored and an error is reported when the mode= token is invalid.</p>
</span><del>-<iframe id="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/malformed-xss-protection-header-3.html&notifyDone=1&malformed-header=3&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</del><ins>+<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/malformed-xss-protection-header-3.html&notifyDone=1&malformed-header=3&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</ins><span class="cx"> </iframe>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditormalformedxssprotectionheader4html"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-4.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-4.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-4.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -13,7 +13,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that the X-XSS-Protection header is not ignored when there is a trailing garbage after mode=block, and we issue an error</p>
</span><del>-<iframe id="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/malformed-xss-protection-header-4.html&notifyDone=1&malformed-header=4&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</del><ins>+<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/malformed-xss-protection-header-4.html&notifyDone=1&malformed-header=4&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</ins><span class="cx"> </iframe>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditormalformedxssprotectionheader5html"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-5.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-5.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-5.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -13,7 +13,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that the X-XSS-Protection header is not ignored when there is an incomplete report url following mode=block, and we issue an error</p>
</span><del>-<iframe id="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/malformed-xss-protection-header-5.html&notifyDone=1&malformed-header=5&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</del><ins>+<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/malformed-xss-protection-header-5.html&notifyDone=1&malformed-header=5&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</ins><span class="cx"> </iframe>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditormalformedxssprotectionheader6html"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-6.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-6.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-6.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -13,7 +13,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that the X-XSS-Protection header is not ignored when there is an incomplete report directive, and we issue an error</p>
</span><del>-<iframe id="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/malformed-xss-protection-header-6.html&notifyDone=1&malformed-header=6&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</del><ins>+<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/malformed-xss-protection-header-6.html&notifyDone=1&malformed-header=6&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</ins><span class="cx"> </iframe>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditormalformedxssprotectionheader7html"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-7.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-7.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-7.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -13,7 +13,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that the X-XSS-Protection header is not ignored when there is an invalid directive, and we issue an error</p>
</span><del>-<iframe id="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/malformed-xss-protection-header-7.html&notifyDone=1&malformed-header=7&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</del><ins>+<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/malformed-xss-protection-header-7.html&notifyDone=1&malformed-header=7&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</ins><span class="cx"> </iframe>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditormalformedxssprotectionheader8html"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-8.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-8.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-8.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -13,7 +13,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that the X-XSS-Protection header is not ignored when there is an duplicate mode directive, and we issue an error</p>
</span><del>-<iframe id="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/malformed-xss-protection-header-8.html&notifyDone=1&malformed-header=8&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</del><ins>+<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/malformed-xss-protection-header-8.html&notifyDone=1&malformed-header=8&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</ins><span class="cx"> </iframe>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditormalformedxssprotectionheader9html"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-9.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-9.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/malformed-xss-protection-header-9.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -13,7 +13,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that the X-XSS-Protection header is not ignored when there is a duplicate report directive, and we issue an error</p>
</span><del>-<iframe id="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/malformed-xss-protection-header-9.html&notifyDone=1&malformed-header=9&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</del><ins>+<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/malformed-xss-protection-header-9.html&notifyDone=1&malformed-header=9&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</ins><span class="cx"> </iframe>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditorreportscripttagreplacestatehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/report-script-tag-replace-state.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/report-script-tag-replace-state.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/report-script-tag-replace-state.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -14,7 +14,7 @@
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that the X-XSS-Protection reports are sent out properly with
</span><span class="cx"> the original, unmodified URL even when a history.replaceState() changes it.</p>
</span><del>-<iframe id="frame" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/report-script-tag-replace-state.html&test=report-script-tag.html&echo-report=1&enable-report=1&replaceState=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message, no JavaScript alert(), and a dump of the report below, then the test PASSED.</p>">
</del><ins>+<iframe id="frame" name="frame" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/report-script-tag-replace-state.html&test=report-script-tag.html&echo-report=1&enable-report=1&replaceState=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message, no JavaScript alert(), and a dump of the report below, then the test PASSED.</p>">
</ins><span class="cx"> </iframe>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditorreportscripttaghtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/report-script-tag.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/report-script-tag.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/report-script-tag.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -13,7 +13,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that the X-XSS-Protection reports are sent out properly</p>
</span><del>-<iframe id="frame" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/report-script-tag.html&echo-report=1&enable-report=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message, no JavaScript alert(), and a dump of the report below, then the test PASSED.</p>">
</del><ins>+<iframe id="frame" name="frame" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/report-script-tag.html&echo-report=1&enable-report=1&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message, no JavaScript alert(), and a dump of the report below, then the test PASSED.</p>">
</ins><span class="cx"> </iframe>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditorresourcesutilitiesjs"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/resources/utilities.js (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/resources/utilities.js        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/resources/utilities.js        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -27,6 +27,7 @@
</span><span class="cx"> document.body.removeChild(document.getElementById('frame'));
</span><span class="cx"> var iFrameObj = document.createElement('iframe');
</span><span class="cx"> iFrameObj.id = 'frame';
</span><ins>+ iFrameObj.name = 'frame';
</ins><span class="cx"> document.body.appendChild(iFrameObj);
</span><span class="cx"> var frameContent = iFrameObj.contentDocument;
</span><span class="cx"> frameContent.open();
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditorxssprotectionparsing02html"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/xss-protection-parsing-02.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/xss-protection-parsing-02.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/xss-protection-parsing-02.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -14,7 +14,7 @@
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that the X-XSS-Protection header is not ignored when there is a trailing semicolon.
</span><span class="cx"> Although theoretically malformed, we tolerate this case without issuing an error. </p>
</span><del>-<iframe id="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/xss-protection-parsing-02.html&notifyDone=1&valid-header=2&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</del><ins>+<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/xss-protection-parsing-02.html&notifyDone=1&valid-header=2&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</ins><span class="cx"> </iframe>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditorxssprotectionparsing03html"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/xss-protection-parsing-03.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/xss-protection-parsing-03.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/xss-protection-parsing-03.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -14,7 +14,7 @@
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that the X-XSS-Protection header is not ignored when there is a trailing semicolon following mode=blank.
</span><span class="cx"> Although theoretically malformed, we tolerate this case without issuing an error. </p>
</span><del>-<iframe id="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/xss-protection-parsing-03.html&notifyDone=1&valid-header=3&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</del><ins>+<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/xss-protection-parsing-03.html&notifyDone=1&valid-header=3&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</ins><span class="cx"> </iframe>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestshttptestssecurityxssAuditorxssprotectionparsing04html"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/http/tests/security/xssAuditor/xss-protection-parsing-04.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/http/tests/security/xssAuditor/xss-protection-parsing-04.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/http/tests/security/xssAuditor/xss-protection-parsing-04.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -13,7 +13,7 @@
</span><span class="cx"> </head>
</span><span class="cx"> <body>
</span><span class="cx"> <p>This tests that the X-XSS-Protection header is not ignored when the report and mode directives are swapped.</p>
</span><del>-<iframe id="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/xss-protection-parsing-04.html&notifyDone=1&valid-header=4&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</del><ins>+<iframe id="frame" name="frame" onload="checkIfFrameLocationMatchesSrcAndCallDone('frame')" src="http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=/security/xssAuditor/xss-protection-parsing-04.html&notifyDone=1&valid-header=4&q=<script>alert(String.fromCharCode(0x58,0x53,0x53))</script><p>If you see this message and no JavaScript alert() then the test PASSED.</p>">
</ins><span class="cx"> </iframe>
</span><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestsplatformmacwebarchivearchiveemptyframedomexpectedtxt"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/platform/mac/webarchive/archive-empty-frame-dom-expected.txt (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/platform/mac/webarchive/archive-empty-frame-dom-expected.txt        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/platform/mac/webarchive/archive-empty-frame-dom-expected.txt        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -18,7 +18,7 @@
</span><span class="cx"> Here lies an `iframe` with no content/src:
</span><span class="cx"> &lt;/p&gt;&lt;p&gt;
</span><span class="cx">
</span><del>-&lt;iframe id="emptyFrame" style="width: 100%; height: 100px; border: solid 2px red;"&gt;
</del><ins>+&lt;iframe name="emptyFrame" style="width: 100%; height: 100px; border: solid 2px red;"&gt;
</ins><span class="cx"> &lt;/iframe&gt;
</span><span class="cx">
</span><span class="cx">
</span></span></pre></div>
<a id="trunkLayoutTestsplatformmacwebarchivearchiveemptyframesourceexpectedtxt"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/platform/mac/webarchive/archive-empty-frame-source-expected.txt (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/platform/mac/webarchive/archive-empty-frame-source-expected.txt        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/platform/mac/webarchive/archive-empty-frame-source-expected.txt        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -21,7 +21,7 @@
</span><span class="cx"> Here lies an `iframe` with no content/src:
</span><span class="cx"> &lt;p&gt;
</span><span class="cx">
</span><del>-&lt;iframe id="emptyFrame" style="width: 100%; height: 100px; border: solid 2px red;"&gt;
</del><ins>+&lt;iframe name="emptyFrame" style="width: 100%; height: 100px; border: solid 2px red;"&gt;
</ins><span class="cx"> &lt;/iframe&gt;
</span><span class="cx">
</span><span class="cx"> &lt;/body&gt;
</span></span></pre></div>
<a id="trunkLayoutTestspluginsgeturlwithiframetargethtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/plugins/get-url-with-iframe-target.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/plugins/get-url-with-iframe-target.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/plugins/get-url-with-iframe-target.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -28,6 +28,6 @@
</span><span class="cx"> <embed id="plg" type="application/x-webkit-test-netscape"></embed>
</span><span class="cx"> This tests that the plugin properly receives NPP_URLNotify for subframe loads.
</span><span class="cx"> <div id="result">FAILED</div>
</span><del>-<iframe id="frame"></iframe>
</del><ins>+<iframe id="frame" name="frame"></iframe>
</ins><span class="cx"> </body>
</span><span class="cx"> </html>
</span></span></pre></div>
<a id="trunkLayoutTestspluginspluginremovesubframehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/plugins/plugin-remove-subframe.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/plugins/plugin-remove-subframe.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/plugins/plugin-remove-subframe.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -30,6 +30,6 @@
</span><span class="cx"> <p>Only works with DumpRenderTree.</p>
</span><span class="cx">
</span><span class="cx"> <div id='d'>
</span><del>- <iframe id='subframe' src='resources/plugin-remove-subframe-iframe.html'></iframe>
</del><ins>+ <iframe id='subframe' name='subframe' src='resources/plugin-remove-subframe-iframe.html'></iframe>
</ins><span class="cx"> </div>
</span><span class="cx"> </body>
</span></span></pre></div>
<a id="trunkLayoutTestswebarchivearchiveemptyframedomexpectedwebarchive"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/webarchive/archive-empty-frame-dom-expected.webarchive (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/webarchive/archive-empty-frame-dom-expected.webarchive        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/webarchive/archive-empty-frame-dom-expected.webarchive        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -18,7 +18,7 @@
</span><span class="cx"> Here lies an `iframe` with no content/src:
</span><span class="cx"> &lt;/p&gt;&lt;p&gt;
</span><span class="cx">
</span><del>-&lt;iframe id="emptyFrame" style="width: 100%; height: 100px; border: solid 2px red;"&gt;
</del><ins>+&lt;iframe name="emptyFrame" style="width: 100%; height: 100px; border: solid 2px red;"&gt;
</ins><span class="cx"> &lt;/iframe&gt;
</span><span class="cx">
</span><span class="cx">
</span></span></pre></div>
<a id="trunkLayoutTestswebarchivearchiveemptyframedomhtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/webarchive/archive-empty-frame-dom.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/webarchive/archive-empty-frame-dom.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/webarchive/archive-empty-frame-dom.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -14,7 +14,7 @@
</span><span class="cx"> Here lies an `iframe` with no content/src:
</span><span class="cx"> <p>
</span><span class="cx">
</span><del>-<iframe id="emptyFrame" style="width: 100%; height: 100px; border: solid 2px red;">
</del><ins>+<iframe name="emptyFrame" style="width: 100%; height: 100px; border: solid 2px red;">
</ins><span class="cx"> </iframe>
</span><span class="cx">
</span><span class="cx"> </body>
</span></span></pre></div>
<a id="trunkLayoutTestswebarchivearchiveemptyframesourceexpectedwebarchive"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/webarchive/archive-empty-frame-source-expected.webarchive (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/webarchive/archive-empty-frame-source-expected.webarchive        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/webarchive/archive-empty-frame-source-expected.webarchive        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -21,7 +21,7 @@
</span><span class="cx"> Here lies an `iframe` with no content/src:
</span><span class="cx"> &lt;p&gt;
</span><span class="cx">
</span><del>-&lt;iframe id="emptyFrame" style="width: 100%; height: 100px; border: solid 2px red;"&gt;
</del><ins>+&lt;iframe name="emptyFrame" style="width: 100%; height: 100px; border: solid 2px red;"&gt;
</ins><span class="cx"> &lt;/iframe&gt;
</span><span class="cx">
</span><span class="cx"> &lt;/body&gt;
</span></span></pre></div>
<a id="trunkLayoutTestswebarchivearchiveemptyframesourcehtml"></a>
<div class="modfile"><h4>Modified: trunk/LayoutTests/webarchive/archive-empty-frame-source.html (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/LayoutTests/webarchive/archive-empty-frame-source.html        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/LayoutTests/webarchive/archive-empty-frame-source.html        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -14,7 +14,7 @@
</span><span class="cx"> Here lies an `iframe` with no content/src:
</span><span class="cx"> <p>
</span><span class="cx">
</span><del>-<iframe id="emptyFrame" style="width: 100%; height: 100px; border: solid 2px red;">
</del><ins>+<iframe name="emptyFrame" style="width: 100%; height: 100px; border: solid 2px red;">
</ins><span class="cx"> </iframe>
</span><span class="cx">
</span><span class="cx"> </body>
</span></span></pre></div>
<a id="trunkSourceWebCoreChangeLog"></a>
<div class="modfile"><h4>Modified: trunk/Source/WebCore/ChangeLog (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/Source/WebCore/ChangeLog        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/Source/WebCore/ChangeLog        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -1,3 +1,28 @@
</span><ins>+2015-10-27 Chris Dumez <cdumez@apple.com>
+
+ id of iframe incorrectly sets window name
+ https://bugs.webkit.org/show_bug.cgi?id=150565
+
+ Reviewed by Darin Adler.
+
+ As per the specification, the iframe's contentWindow name should be an
+ empty string if the frame's name attribute is unset:
+ http://www.whatwg.org/specs/web-apps/current-work/multipage/the-iframe-element.html#attr-iframe-name
+
+ Instead, WebKit was using the iframe's id as window name if the name
+ was unset.
+
+ Firefox, IE and Chrome behave according to the specification.
+
+ This is a merge of the following Blink commit:
+ https://src.chromium.org/viewvc/blink?revision=169803&view=revision
+
+ Test: fast/frames/iframe-no-name.html
+
+ * html/HTMLFrameElementBase.cpp:
+ (WebCore::HTMLFrameElementBase::parseAttribute):
+ (WebCore::HTMLFrameElementBase::insertedInto): Deleted.
+
</ins><span class="cx"> 2015-10-27 Joseph Pecoraro <pecoraro@apple.com>
</span><span class="cx">
</span><span class="cx"> Web Inspector: Remove Timeline MarkDOMContent and MarkLoad, data is already available
</span></span></pre></div>
<a id="trunkSourceWebCorehtmlHTMLFrameElementBasecpp"></a>
<div class="modfile"><h4>Modified: trunk/Source/WebCore/html/HTMLFrameElementBase.cpp (191651 => 191652)</h4>
<pre class="diff"><span>
<span class="info">--- trunk/Source/WebCore/html/HTMLFrameElementBase.cpp        2015-10-28 02:44:54 UTC (rev 191651)
+++ trunk/Source/WebCore/html/HTMLFrameElementBase.cpp        2015-10-28 04:40:04 UTC (rev 191652)
</span><span class="lines">@@ -96,11 +96,8 @@
</span><span class="cx"> setLocation("about:srcdoc");
</span><span class="cx"> else if (name == srcAttr && !fastHasAttribute(srcdocAttr))
</span><span class="cx"> setLocation(stripLeadingAndTrailingHTMLSpaces(value));
</span><del>- else if (name == HTMLNames::idAttr) {
- HTMLFrameOwnerElement::parseAttribute(name, value);
</del><ins>+ else if (name == nameAttr) {
</ins><span class="cx"> m_frameName = value;
</span><del>- } else if (name == nameAttr) {
- m_frameName = value;
</del><span class="cx"> // FIXME: If we are already attached, this doesn't actually change the frame's name.
</span><span class="cx"> // FIXME: If we are already attached, this doesn't check for frame name
</span><span class="cx"> // conflicts and generate a unique frame name.
</span><span class="lines">@@ -124,8 +121,6 @@
</span><span class="cx"> void HTMLFrameElementBase::setNameAndOpenURL()
</span><span class="cx"> {
</span><span class="cx"> m_frameName = getNameAttribute();
</span><del>- if (m_frameName.isNull())
- m_frameName = getIdAttribute();
</del><span class="cx"> openURL();
</span><span class="cx"> }
</span><span class="cx">
</span></span></pre>
</div>
</div>
</body>
</html>