Index: LayoutTests/http/tests/security/xssAuditor/full-block-script-tag-with-source-expected.txt |
diff --git a/LayoutTests/http/tests/security/xssAuditor/full-block-script-tag-with-source-expected.txt b/LayoutTests/http/tests/security/xssAuditor/full-block-script-tag-with-source-expected.txt |
index d2918c561a2f0a0015d0100460724290a71c0164..554209929940e745244cae2d3a315cb34da1ba5e 100644 |
--- a/LayoutTests/http/tests/security/xssAuditor/full-block-script-tag-with-source-expected.txt |
+++ b/LayoutTests/http/tests/security/xssAuditor/full-block-script-tag-with-source-expected.txt |
@@ -1,5 +1,4 @@ |
CONSOLE ERROR: line 4: The XSS Auditor blocked access to 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=%3Cscript%20src=%27http://localhost:8000/security/xssAuditor/resources/xss.js%27%3E%3C/script%3E' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior. |
-ALERT: URL mismatch: '[Location object access threw exception]' vs. 'http://127.0.0.1:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=%3Cscript%20src=%27http://localhost:8000/security/xssAuditor/resources/xss.js%27%3E%3C/script%3E' |
There should be no content in the iframe below: |