| Index: LayoutTests/http/tests/security/xssAuditor/full-block-iframe-javascript-url-expected.txt
|
| diff --git a/LayoutTests/http/tests/security/xssAuditor/full-block-iframe-javascript-url-expected.txt b/LayoutTests/http/tests/security/xssAuditor/full-block-iframe-javascript-url-expected.txt
|
| index 144c898f45a9cc990ff407c263ff0008573c2901..927384a6b5fdce212b9216b3feccefa260f296b8 100644
|
| --- a/LayoutTests/http/tests/security/xssAuditor/full-block-iframe-javascript-url-expected.txt
|
| +++ b/LayoutTests/http/tests/security/xssAuditor/full-block-iframe-javascript-url-expected.txt
|
| @@ -1,6 +1,4 @@
|
| CONSOLE MESSAGE: line 4: The XSS Auditor blocked access to 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=%3Ciframe%20src=javascript:alert(document.domain)%3E' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
|
| -CONSOLE MESSAGE: Blocked a frame with origin "http://127.0.0.1:8000" from accessing a frame with origin "null". The frame requesting access has a protocol of "http", the frame being accessed has a protocol of "data". Protocols must match.
|
| -
|
| ALERT: URL mismatch: '[Location object access threw exception]' vs. 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=%3Ciframe%20src=javascript:alert(document.domain)%3E'
|
| There should be no content in the iframe below:
|
|
|
|
|