Index: LayoutTests/http/tests/security/xssAuditor/window-open-block-mode-expected.txt |
diff --git a/LayoutTests/http/tests/security/xssAuditor/window-open-block-mode-expected.txt b/LayoutTests/http/tests/security/xssAuditor/window-open-block-mode-expected.txt |
new file mode 100644 |
index 0000000000000000000000000000000000000000..5c48aaa59c6c3b402082f9b0c9dd3a9b75652db4 |
--- /dev/null |
+++ b/LayoutTests/http/tests/security/xssAuditor/window-open-block-mode-expected.txt |
@@ -0,0 +1,13 @@ |
+CONSOLE ERROR: line 4: The XSS Auditor blocked access to 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3Ealert(/xss/)%3C/script%3E&enable-full-block=1' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior. |
+Test that under x-xss-protection mode=block that the block page URL is added on top of the existing page instead of replacing it. Test passes if the second window has a two-item back-forward list. |
+ |
+ |
+ |
+============== Back Forward List ============== |
+curr-> http://127.0.0.1:8000/security/xssAuditor/window-open-block-mode.html |
+=============================================== |
+ |
+============== Back Forward List ============== |
+ http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3Ealert(/xss/)%3C/script%3E&enable-full-block=1 |
+curr-> data:, |
+=============================================== |