Index: LayoutTests/http/tests/security/contentSecurityPolicy/1.1/reflected-xss-block-expected.txt |
diff --git a/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/reflected-xss-block-expected.txt b/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/reflected-xss-block-expected.txt |
index 3cf245aabe9862f58ed917164849279e71eacef6..984b3bb208033f63547bec1be37aa7da57f09504 100644 |
--- a/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/reflected-xss-block-expected.txt |
+++ b/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/reflected-xss-block-expected.txt |
@@ -1,7 +1,7 @@ |
CONSOLE MESSAGE: line 4: The XSS Auditor blocked access to 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?csp=block&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E' because the source code of a script was found within the request. The server sent a 'Content-Security-Policy' header requesting this behavior. |
CONSOLE MESSAGE: Blocked a frame with origin "http://127.0.0.1:8000" from accessing a frame with origin "null". The frame requesting access has a protocol of "http", the frame being accessed has a protocol of "data". Protocols must match. |
-ALERT: URL mismatch: undefined vs. http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?csp=block&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E |
+ALERT: URL mismatch: '[Location object access threw exception]' vs. 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?csp=block&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E' |
Tests that 'Content-Security-Policy: reflected-xss block;' enables the XSSAuditor. This test passes if a console message is generated, and the page is blocked. There should be no content in the IFrame below: |