| Index: LayoutTests/http/tests/security/suborigins/crossorigin/suborigin-cross-origin-script-window-onerror.php
|
| diff --git a/LayoutTests/http/tests/security/suborigins/crossorigin/suborigin-cross-origin-script-window-onerror.php b/LayoutTests/http/tests/security/suborigins/crossorigin/suborigin-cross-origin-script-window-onerror.php
|
| deleted file mode 100644
|
| index a1520e93642c57066faeb3d74f9c9ffea6c3d6f8..0000000000000000000000000000000000000000
|
| --- a/LayoutTests/http/tests/security/suborigins/crossorigin/suborigin-cross-origin-script-window-onerror.php
|
| +++ /dev/null
|
| @@ -1,28 +0,0 @@
|
| -<?php
|
| -header("Content-Security-Policy: suborigin foobar");
|
| -?>
|
| -<html>
|
| -<body>
|
| -<p>
|
| -Test that window.onerror won't reveal any potentially sensitive script content if the latter is loaded from a different suborigin. The test passes if you don't see any data from the linked resource.
|
| -</p>
|
| -
|
| -</p>
|
| -<div id="result"></div>
|
| -<script>
|
| -if (window.testRunner) {
|
| - testRunner.waitUntilDone();
|
| - testRunner.dumpAsText();
|
| -}
|
| -
|
| -window.onerror = function(message, url, line) {
|
| - document.getElementById("result").textContent = "window.onerror message: " + message + " at " + url + ": " + line;
|
| - if (window.testRunner)
|
| - testRunner.notifyDone();
|
| - return true;
|
| -}
|
| -</script>
|
| -<script src="/security/resources/cross-origin-script.txt">
|
| -</script>
|
| -</body>
|
| -</html>
|
|
|