Index: third_party/WebKit/LayoutTests/http/tests/security/xssAuditor/form-action-token-fragment.html |
diff --git a/third_party/WebKit/LayoutTests/http/tests/security/xssAuditor/form-action-token-fragment.html b/third_party/WebKit/LayoutTests/http/tests/security/xssAuditor/form-action-token-fragment.html |
deleted file mode 100644 |
index 4521aac2d6b11b02b95703dc49dbb0c4a7a493f2..0000000000000000000000000000000000000000 |
--- a/third_party/WebKit/LayoutTests/http/tests/security/xssAuditor/form-action-token-fragment.html |
+++ /dev/null |
@@ -1,29 +0,0 @@ |
-<!DOCTYPE html> |
-<html> |
-<head> |
-<script> |
-if (window.testRunner) { |
- testRunner.dumpAsText(); |
- testRunner.dumpChildFramesAsText(); |
- testRunner.waitUntilDone(); |
- testRunner.setXSSAuditorEnabled(true); |
-} |
-function done() |
-{ |
- if (window.testRunner) |
- testRunner.notifyDone(); |
-} |
-</script> |
-</head> |
-<body> |
-This test shows that the XSSAuditor can not be induced to fire against a leading |
-substring of an otherwise unknown attribute. |
-<iframe id="myframe"></iframe> |
-<script> |
-var pad = '11111111111111111111111111111111111111111111111111111'; |
-var guess = 'action%3d%22http://localhost:8000/foo%3fpad%3d' + pad + '%26tok%3d1234' |
-var src = 'resources/echo-form-action.pl?add-token=1&q=http://localhost:8000/foo%3fpad%3d' + pad + '&guess=' + guess; |
-document.getElementById('myframe').src = src; |
-</script> |
-</body> |
-</html> |