| Index: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/reflected-xss-block-expected.txt
|
| diff --git a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/reflected-xss-block-expected.txt b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/reflected-xss-block-expected.txt
|
| deleted file mode 100644
|
| index a4e7bf9df42ba0d95b1d154c7588d6f5db6efe5e..0000000000000000000000000000000000000000
|
| --- a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/reflected-xss-block-expected.txt
|
| +++ /dev/null
|
| @@ -1,10 +0,0 @@
|
| -CONSOLE ERROR: line 4: The XSS Auditor blocked access to 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?csp=block&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E' because the source code of a script was found within the request. The server sent a 'Content-Security-Policy' header requesting this behavior.
|
| -ALERT: URL mismatch: '[Location object access threw exception]' vs. 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?csp=block&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E'
|
| -Tests that 'Content-Security-Policy: reflected-xss block;' enables the XSSAuditor. This test passes if a console message is generated, and the page is blocked. There should be no content in the IFrame below:
|
| -
|
| -
|
| -
|
| ---------
|
| -Frame: 'frame'
|
| ---------
|
| -
|
|
|