Index: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-star-allow-crossorigin-expected.txt |
diff --git a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-star-allow-crossorigin-expected.txt b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-star-allow-crossorigin-expected.txt |
deleted file mode 100644 |
index 5a88528868911ef33df1d37f6ff2d6e515a8bfb5..0000000000000000000000000000000000000000 |
--- a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/1.1/frame-ancestors/frame-ancestors-star-allow-crossorigin-expected.txt |
+++ /dev/null |
@@ -1,17 +0,0 @@ |
-A 'frame-ancestors' CSP directive with '*' should allow rendering. |
- |
-On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE". |
- |
- |
-Note that we can't distinguish blocked URLs from allowed cross-origin URLs due to the same-origin policy. This test passes if no console message declares that the frame was blocked. |
-IFrame load event fired: the IFrame is cross-origin (or was blocked). |
-PASS The IFrame should have been blocked (or cross-origin). It was. |
-PASS successfullyParsed is true |
- |
-TEST COMPLETE |
- |
- |
--------- |
-Frame: '<!--framePath //<!--frame0-->-->' |
--------- |
-This is an IFrame sending a Content Security Policy header containing "frame-ancestors *". |