Index: LayoutTests/http/tests/security/xssAuditor/window-open-block-mode-expected.txt |
diff --git a/LayoutTests/http/tests/security/xssAuditor/window-open-block-mode-expected.txt b/LayoutTests/http/tests/security/xssAuditor/window-open-block-mode-expected.txt |
deleted file mode 100644 |
index 5c48aaa59c6c3b402082f9b0c9dd3a9b75652db4..0000000000000000000000000000000000000000 |
--- a/LayoutTests/http/tests/security/xssAuditor/window-open-block-mode-expected.txt |
+++ /dev/null |
@@ -1,13 +0,0 @@ |
-CONSOLE ERROR: line 4: The XSS Auditor blocked access to 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3Ealert(/xss/)%3C/script%3E&enable-full-block=1' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior. |
-Test that under x-xss-protection mode=block that the block page URL is added on top of the existing page instead of replacing it. Test passes if the second window has a two-item back-forward list. |
- |
- |
- |
-============== Back Forward List ============== |
-curr-> http://127.0.0.1:8000/security/xssAuditor/window-open-block-mode.html |
-=============================================== |
- |
-============== Back Forward List ============== |
- http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?q=%3Cscript%3Ealert(/xss/)%3C/script%3E&enable-full-block=1 |
-curr-> data:, |
-=============================================== |