Index: LayoutTests/http/tests/security/xssAuditor/full-block-object-tag-expected.txt |
diff --git a/LayoutTests/http/tests/security/xssAuditor/full-block-object-tag-expected.txt b/LayoutTests/http/tests/security/xssAuditor/full-block-object-tag-expected.txt |
index c17e752000502b4740518c06edbe6fe2f5593f5d..3e29d6403f6d41ecc1f8e759d592dd90e635a613 100644 |
--- a/LayoutTests/http/tests/security/xssAuditor/full-block-object-tag-expected.txt |
+++ b/LayoutTests/http/tests/security/xssAuditor/full-block-object-tag-expected.txt |
@@ -1,6 +1,4 @@ |
CONSOLE MESSAGE: line 4: The XSS Auditor blocked access to 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=%3Cobject%20name='plugin'%20type='application/x-webkit-test-netscape'%3E%3Cparam%20name='movie'%20value='http://localhost:8000/security/xssAuditor/resources/dummy.swf'%20/%3E%3C/object%3E' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior. |
-CONSOLE MESSAGE: Blocked a frame with origin "http://127.0.0.1:8000" from accessing a frame with origin "null". The frame requesting access has a protocol of "http", the frame being accessed has a protocol of "data". Protocols must match. |
- |
ALERT: URL mismatch: '[Location object access threw exception]' vs. 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=%3Cobject%20name='plugin'%20type='application/x-webkit-test-netscape'%3E%3Cparam%20name='movie'%20value='http://localhost:8000/security/xssAuditor/resources/dummy.swf'%20/%3E%3C/object%3E' |
There should be no content in the iframe below: |