Index: LayoutTests/http/tests/security/xssAuditor/block-does-not-leak-referrer-expected.txt |
diff --git a/LayoutTests/http/tests/security/xssAuditor/block-does-not-leak-referrer-expected.txt b/LayoutTests/http/tests/security/xssAuditor/block-does-not-leak-referrer-expected.txt |
index 970791561be5f5cf935941bc7e1a9d1c3a9f2e5b..69e00cc2175ba4ccc0092460aed1ffc66e31d3be 100644 |
--- a/LayoutTests/http/tests/security/xssAuditor/block-does-not-leak-referrer-expected.txt |
+++ b/LayoutTests/http/tests/security/xssAuditor/block-does-not-leak-referrer-expected.txt |
@@ -1,5 +1,5 @@ |
CONSOLE ERROR: line 4: The XSS Auditor blocked access to 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior. |
-PASS frame.contentDocument threw exception SecurityError: Blocked a frame with origin "http://127.0.0.1:8000" from accessing a cross-origin frame.. |
+PASS frame.contentDocument threw exception SecurityError: Failed to read the 'contentDocument' property from 'HTMLIFrameElement': Blocked a frame with origin "http://127.0.0.1:8000" from accessing a cross-origin frame.. |
PASS successfullyParsed is true |
TEST COMPLETE |