| Index: LayoutTests/http/tests/security/xssAuditor/full-block-script-tag-cross-domain-expected.txt
|
| diff --git a/LayoutTests/http/tests/security/xssAuditor/full-block-script-tag-cross-domain-expected.txt b/LayoutTests/http/tests/security/xssAuditor/full-block-script-tag-cross-domain-expected.txt
|
| index 40b0c1b6f8e2c6e311ec7169e32a8b6abf924989..448ccf3689cffb2579efe271a7692e9a872dc0a6 100644
|
| --- a/LayoutTests/http/tests/security/xssAuditor/full-block-script-tag-cross-domain-expected.txt
|
| +++ b/LayoutTests/http/tests/security/xssAuditor/full-block-script-tag-cross-domain-expected.txt
|
| @@ -1,5 +1,5 @@
|
| CONSOLE ERROR: line 4: The XSS Auditor blocked access to 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E' because the source code of a script was found within the request. The server sent an 'X-XSS-Protection' header requesting this behavior.
|
| -CONSOLE MESSAGE: line 19: PASS: Cross-origin access threw: 'SecurityError: Blocked a frame with origin "http://127.0.0.1:8000" from accessing a cross-origin frame.'.
|
| +CONSOLE MESSAGE: line 19: PASS: Cross-origin access threw: 'SecurityError: Failed to read the 'contentDocument' property from 'HTMLIFrameElement': Blocked a frame with origin "http://127.0.0.1:8000" from accessing a cross-origin frame.'.
|
| ALERT: URL mismatch: '[Location object access threw exception]' vs. 'http://localhost:8000/security/xssAuditor/resources/echo-intertag.pl?enable-full-block=1&q=%3Cscript%3Ealert(String.fromCharCode(0x58,0x53,0x53))%3C/script%3E'
|
| There should be no content in the iframe below:
|
|
|
|
|