| OLD | NEW | 
|   1 <!DOCTYPE html> |   1 <!DOCTYPE html> | 
|   2 <html> |   2 <html> | 
|   3 <head> |   3 <head> | 
 |   4     <script src="resources/report-test.js"></script> | 
|   4     <meta http-equiv="Content-Security-Policy" content="img-src 'none'; report-u
    ri http://localhost:8080/security/contentSecurityPolicy/resources/save-report.ph
    p"> |   5     <meta http-equiv="Content-Security-Policy" content="img-src 'none'; report-u
    ri http://localhost:8080/security/contentSecurityPolicy/resources/save-report.ph
    p"> | 
|   5 </head> |   6 </head> | 
|   6 <body> |   7 <body> | 
|   7 <script> |   8 <script> | 
|   8     var xhr = new XMLHttpRequest(); |   9     var xhr = new XMLHttpRequest(); | 
|   9     xhr.open("GET", "http://localhost:8080/cookies/resources/setCookies.cgi", fa
    lse); |  10     xhr.open("GET", "http://localhost:8080/cookies/resources/setCookies.cgi", fa
    lse); | 
|  10     xhr.setRequestHeader("SET-COOKIE", "cspViolationReportCookie=crossOrigin;pat
    h=/"); |  11     xhr.setRequestHeader("SET-COOKIE", "cspViolationReportCookie=crossOrigin;pat
    h=/"); | 
|  11     xhr.send(null); |  12     xhr.send(null); | 
|  12 </script> |  13 </script> | 
|  13  |  14  | 
|  14 <!-- This image will generate a CSP violation report. --> |  15 <!-- This image will generate a CSP violation report. --> | 
|  15 <img src="/security/resources/abe.png"> |  16 <img src="/security/resources/abe.png"> | 
|  16  |  17  | 
|  17 <script src='resources/go-to-echo-report.js'></script> |  18 <script src='resources/go-to-echo-report.js'></script> | 
|  18 </body> |  19 </body> | 
|  19 </html> |  20 </html> | 
| OLD | NEW |