| Index: LayoutTests/http/tests/security/xssAuditor/window-open-block-mode-expected.txt
|
| diff --git a/LayoutTests/http/tests/security/xssAuditor/window-open-block-mode-expected.txt b/LayoutTests/http/tests/security/xssAuditor/window-open-block-mode-expected.txt
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..5c48aaa59c6c3b402082f9b0c9dd3a9b75652db4
|
| --- /dev/null
|
| +++ b/LayoutTests/http/tests/security/xssAuditor/window-open-block-mode-expected.txt
|
| @@ -0,0 +1,13 @@
|
| +CONSOLE ERROR: line 4: The XSS Auditor blocked access to 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3Ealert(/xss/)%3C/script%3E&enable-full-block=1' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
|
| +Test that under x-xss-protection mode=block that the block page URL is added on top of the existing page instead of replacing it. Test passes if the second window has a two-item back-forward list.
|
| +
|
| +
|
| +
|
| +============== Back Forward List ==============
|
| +curr-> http://127.0.0.1:8000/security/xssAuditor/window-open-block-mode.html
|
| +===============================================
|
| +
|
| +============== Back Forward List ==============
|
| + http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3Ealert(/xss/)%3C/script%3E&enable-full-block=1
|
| +curr-> data:,
|
| +===============================================
|
|
|