Index: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-invalid-filter-expected.txt |
diff --git a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-invalid-filter-expected.txt b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-invalid-filter-expected.txt |
deleted file mode 100644 |
index f66c0b03584142ef3a76446e777187b761523b00..0000000000000000000000000000000000000000 |
--- a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/reflected-xss-and-xss-protection-invalid-filter-expected.txt |
+++ /dev/null |
@@ -1,9 +0,0 @@ |
-CONSOLE ERROR: The 'reflected-xss' Content Security Policy directive has the invalid value "invalid". Valid values are "allow", "filter", and "block". |
-CONSOLE ERROR: line 4: The XSS Auditor refused to execute a script in 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E&csp=invalid&valid-header=2' because its source code was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior. |
-ALERT: Loaded http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E&csp=invalid&valid-header=2 into the IFrame. |
-Testing behavior when "reflected-xss" is set to invalid, and "X-XSS-Protection" is set to filter. |
- |
--------- |
-Frame: '<!--framePath //<!--frame0-->-->' |
--------- |
-Page rendered here. |