Index: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/securitypolicyviolation/securitypolicyviolation-block-cross-origin-image-from-script-expected.txt |
diff --git a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/securitypolicyviolation/securitypolicyviolation-block-cross-origin-image-from-script-expected.txt b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/securitypolicyviolation/securitypolicyviolation-block-cross-origin-image-from-script-expected.txt |
index ca04e6cf063bf7b1ece292d51eb76a29b3ecfb14..65767dfb9cfac3baf37497da24be373db850e713 100644 |
--- a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/securitypolicyviolation/securitypolicyviolation-block-cross-origin-image-from-script-expected.txt |
+++ b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/securitypolicyviolation/securitypolicyviolation-block-cross-origin-image-from-script-expected.txt |
@@ -9,7 +9,7 @@ Kicking off the tests: |
PASS window.e.documentURI is "http://127.0.0.1:8000/security/contentSecurityPolicy/securitypolicyviolation/securitypolicyviolation-block-cross-origin-image-from-script.html" |
PASS window.e.referrer is "" |
PASS window.e.blockedURI is "http://127.0.0.1:8000/security/resources/abe.png" |
-PASS window.e.violatedDirective is "img-src 'none'" |
+PASS window.e.violatedDirective is "img-src" |
PASS window.e.effectiveDirective is "img-src" |
PASS window.e.originalPolicy is "img-src 'none'" |
PASS window.e.disposition is "enforce" |