Index: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/reflected-xss-block-expected.txt |
diff --git a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/reflected-xss-block-expected.txt b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/reflected-xss-block-expected.txt |
deleted file mode 100644 |
index a4e7bf9df42ba0d95b1d154c7588d6f5db6efe5e..0000000000000000000000000000000000000000 |
--- a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/reflected-xss-block-expected.txt |
+++ /dev/null |
@@ -1,10 +0,0 @@ |
-CONSOLE ERROR: line 4: The XSS Auditor blocked access to 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?csp=block&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E' because the source code of a script was found within the request. The server sent a 'Content-Security-Policy' header requesting this behavior. |
-ALERT: URL mismatch: '[Location object access threw exception]' vs. 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?csp=block&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E' |
-Tests that 'Content-Security-Policy: reflected-xss block;' enables the XSSAuditor. This test passes if a console message is generated, and the page is blocked. There should be no content in the IFrame below: |
- |
- |
- |
--------- |
-Frame: 'frame' |
--------- |
- |