Index: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-same-in-same-url-allow-expected.txt |
diff --git a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-same-in-same-url-allow-expected.txt b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-same-in-same-url-allow-expected.txt |
deleted file mode 100644 |
index e5d6974eeca1a24c09665d37ce0c9e7c57ef6fbc..0000000000000000000000000000000000000000 |
--- a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-nested-same-in-same-url-allow-expected.txt |
+++ /dev/null |
@@ -1,27 +0,0 @@ |
-CONSOLE MESSAGE: line 64: IFrame load event fired: the IFrame's location is 'http://127.0.0.1:8000/security/contentSecurityPolicy/resources/frame-ancestors.pl?policy=http://127.0.0.1:8000'. |
-A 'frame-ancestors' CSP directive with a URL value should block or allow rendering in nested frames as appropriate. |
- |
-On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE". |
- |
- |
-PASS The inner IFrame passed. |
-PASS successfullyParsed is true |
- |
-TEST COMPLETE |
- |
- |
--------- |
-Frame: '<!--framePath //<!--frame0-->-->' |
--------- |
-Testing a same-origin child with a policy of "http://127.0.0.1:8000" nested in a same-origin parent. |
- |
-On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE". |
- |
- |
-PASS The IFrame should not have been blocked. It wasn't. |
- |
- |
--------- |
-Frame: '<!--framePath //<!--frame0-->/<!--frame0-->-->' |
--------- |
-This is an IFrame sending a Content Security Policy header containing "frame-ancestors http://127.0.0.1:8000". |