| Index: third_party/WebKit/LayoutTests/http/tests/security/xssAuditor/report-script-tag-full-block-expected.txt
|
| diff --git a/third_party/WebKit/LayoutTests/http/tests/security/xssAuditor/report-script-tag-full-block-expected.txt b/third_party/WebKit/LayoutTests/http/tests/security/xssAuditor/report-script-tag-full-block-expected.txt
|
| index 7885c294ff4838c75ca4d31dd6596edf68028812..10a1349e813bf2ca3b797485bfbc1003a2fbfe2f 100644
|
| --- a/third_party/WebKit/LayoutTests/http/tests/security/xssAuditor/report-script-tag-full-block-expected.txt
|
| +++ b/third_party/WebKit/LayoutTests/http/tests/security/xssAuditor/report-script-tag-full-block-expected.txt
|
| @@ -1,6 +1,6 @@
|
| CONSOLE ERROR: line 4: The XSS Auditor blocked access to 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=report-script-tag-full-block.html&enable-full-block-report=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3Cp%3EIf%20you%20see%20this%20message,%20no%20JavaScript%20alert(),%20and%20a%20dump%20of%20the%20report%20below,%20then%20the%20test%20PASSED.%3C/p%3E' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
|
| CSP report received:
|
| -CONTENT_TYPE: application/json
|
| +CONTENT_TYPE: application/xss-auditor-report
|
| HTTP_REFERER: http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?test=report-script-tag-full-block.html&enable-full-block-report=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E%3Cp%3EIf%20you%20see%20this%20message,%20no%20JavaScript%20alert(),%20and%20a%20dump%20of%20the%20report%20below,%20then%20the%20test%20PASSED.%3C/p%3E
|
| REQUEST_METHOD: POST
|
| === POST DATA ===
|
|
|