Skip to content

Commit

Permalink
Rename COEP:{cors-or-credentialless => credentialless}
Browse files Browse the repository at this point in the history
This was discussed here:
whatwg/html#6637 (comment)

This patch renames "cors-or-credentialless" into "credentialless".

The WPT test directory:
- html/cross-origin-embedder-policy/credentialless/cors-or-credentialess/
- html/cross-origin-embedder-policy/credentialless/full-credentialless/
are renamed:
- html/cross-origin-embedder-policy/cors-or-credentialess/
- html/cross-origin-embedder-policy/anonymous-iframe/

Bug: 1175099
Change-Id: Iba052a2b3fbf4b45607c48807622d5ced202d583
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2867588
Commit-Queue: Arthur Sonzogni <arthursonzogni@chromium.org>
Reviewed-by: Camille Lamy <clamy@chromium.org>
Reviewed-by: Kinuko Yasuda <kinuko@chromium.org>
Owners-Override: Kinuko Yasuda <kinuko@chromium.org>
Cr-Commit-Position: refs/heads/master@{#880359}
  • Loading branch information
ArthurSonzogni authored and Chromium LUCI CQ committed May 7, 2021
1 parent e8f31a2 commit 69edb0b
Show file tree
Hide file tree
Showing 44 changed files with 161 additions and 147 deletions.
54 changes: 27 additions & 27 deletions chrome/browser/chrome_web_platform_security_metrics_browsertest.cc
Original file line number Diff line number Diff line change
Expand Up @@ -1031,18 +1031,18 @@ IN_PROC_BROWSER_TEST_F(ChromeWebPlatformSecurityMetricsBrowserTest,
"/set-header?"
"Cross-Origin-Embedder-Policy: unsafe-none");
EXPECT_TRUE(content::NavigateToURL(web_contents(), url));
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyCorsOrCredentialless, 0);
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyCredentialless, 0);
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyRequireCorp, 0);
}

IN_PROC_BROWSER_TEST_F(ChromeWebPlatformSecurityMetricsBrowserTest,
CoepCorsOrCredentiallessMainFrame) {
GURL url = https_server().GetURL(
"a.com",
"/set-header?"
"Cross-Origin-Embedder-Policy: cors-or-credentialless");
CoepCredentiallessMainFrame) {
GURL url =
https_server().GetURL("a.com",
"/set-header?"
"Cross-Origin-Embedder-Policy: credentialless");
EXPECT_TRUE(content::NavigateToURL(web_contents(), url));
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyCorsOrCredentialless, 1);
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyCredentialless, 1);
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyRequireCorp, 0);
}

Expand All @@ -1053,18 +1053,18 @@ IN_PROC_BROWSER_TEST_F(ChromeWebPlatformSecurityMetricsBrowserTest,
"/set-header?"
"Cross-Origin-Embedder-Policy: require-corp");
EXPECT_TRUE(content::NavigateToURL(web_contents(), url));
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyCorsOrCredentialless, 0);
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyCredentialless, 0);
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyRequireCorp, 1);
}

IN_PROC_BROWSER_TEST_F(ChromeWebPlatformSecurityMetricsBrowserTest,
CoepReportOnlyCorsOrCredentiallessMainFrame) {
CoepReportOnlyCredentiallessMainFrame) {
GURL url = https_server().GetURL(
"a.com",
"/set-header?"
"Cross-Origin-Embedder-Policy-Report-Only: cors-or-credentialless");
"Cross-Origin-Embedder-Policy-Report-Only: credentialless");
EXPECT_TRUE(content::NavigateToURL(web_contents(), url));
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyCorsOrCredentialless, 0);
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyCredentialless, 0);
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyRequireCorp, 0);
}

Expand All @@ -1073,46 +1073,46 @@ IN_PROC_BROWSER_TEST_F(ChromeWebPlatformSecurityMetricsBrowserTest,
GURL url = https_server().GetURL(
"a.com",
"/set-header?"
"Cross-Origin-Embedder-Policy-Report-Only: cors-or-credentialless");
"Cross-Origin-Embedder-Policy-Report-Only: credentialless");
EXPECT_TRUE(content::NavigateToURL(web_contents(), url));
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyCorsOrCredentialless, 0);
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyCredentialless, 0);
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyRequireCorp, 0);
}

IN_PROC_BROWSER_TEST_F(ChromeWebPlatformSecurityMetricsBrowserTest,
CoepRequireCorpEmbedsCorsOrCredentialless) {
CoepRequireCorpEmbedsCredentialless) {
GURL main_url =
https_server().GetURL("a.com",
"/set-header?"
"Cross-Origin-Embedder-Policy: require-corp");
EXPECT_TRUE(content::NavigateToURL(web_contents(), main_url));
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyCorsOrCredentialless, 0);
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyCredentialless, 0);
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyRequireCorp, 1);
GURL child_url = https_server().GetURL(
"a.com",
"/set-header?"
"Cross-Origin-Embedder-Policy: cors-or-credentialless");
GURL child_url =
https_server().GetURL("a.com",
"/set-header?"
"Cross-Origin-Embedder-Policy: credentialless");
LoadIFrame(child_url);
EXPECT_TRUE(content::WaitForLoadStop(web_contents()));
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyCorsOrCredentialless, 1);
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyCredentialless, 1);
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyRequireCorp, 1);
}

IN_PROC_BROWSER_TEST_F(ChromeWebPlatformSecurityMetricsBrowserTest,
CoepCorsOrCredentiallessEmbedsRequireCorp) {
GURL main_url = https_server().GetURL(
"a.com",
"/set-header?"
"Cross-Origin-Embedder-Policy: cors-or-credentialless");
CoepCredentiallessEmbedsRequireCorp) {
GURL main_url =
https_server().GetURL("a.com",
"/set-header?"
"Cross-Origin-Embedder-Policy: credentialless");
EXPECT_TRUE(content::NavigateToURL(web_contents(), main_url));
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyCorsOrCredentialless, 1);
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyCredentialless, 1);
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyRequireCorp, 0);
GURL child_url =
https_server().GetURL("a.com",
"/set-header?"
"Cross-Origin-Embedder-Policy: require-corp");
LoadIFrame(child_url);
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyCorsOrCredentialless, 1);
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyCredentialless, 1);
CheckCounter(WebFeature::kCrossOriginEmbedderPolicyRequireCorp, 1);
}

Expand Down
2 changes: 1 addition & 1 deletion content/browser/devtools/protocol/network_handler.cc
Original file line number Diff line number Diff line change
Expand Up @@ -2551,7 +2551,7 @@ makeCrossOriginEmbedderPolicyValue(
switch (value) {
case network::mojom::CrossOriginEmbedderPolicyValue::kNone:
return protocol::Network::CrossOriginEmbedderPolicyValueEnum::None;
case network::mojom::CrossOriginEmbedderPolicyValue::kCorsOrCredentialless:
case network::mojom::CrossOriginEmbedderPolicyValue::kCredentialless:
return protocol::Network::CrossOriginEmbedderPolicyValueEnum::
CorsOrCredentialless;
case network::mojom::CrossOriginEmbedderPolicyValue::kRequireCorp:
Expand Down
6 changes: 3 additions & 3 deletions content/browser/renderer_host/navigator.cc
Original file line number Diff line number Diff line change
Expand Up @@ -79,10 +79,10 @@ void RecordWebPlatformSecurityMetrics(RenderFrameHostImpl* rfh,
switch (rfh->cross_origin_embedder_policy().value) {
case network::mojom::CrossOriginEmbedderPolicyValue::kNone:
break;
case network::mojom::CrossOriginEmbedderPolicyValue::kCorsOrCredentialless:
case network::mojom::CrossOriginEmbedderPolicyValue::kCredentialless:
client->LogWebFeatureForCurrentPage(
rfh, blink::mojom::WebFeature::
kCrossOriginEmbedderPolicyCorsOrCredentialless);
rfh,
blink::mojom::WebFeature::kCrossOriginEmbedderPolicyCredentialless);
break;
case network::mojom::CrossOriginEmbedderPolicyValue::kRequireCorp:
client->LogWebFeatureForCurrentPage(
Expand Down
4 changes: 2 additions & 2 deletions content/browser/worker_host/dedicated_worker_host.cc
Original file line number Diff line number Diff line change
Expand Up @@ -438,7 +438,7 @@ bool DedicatedWorkerHost::CheckCrossOriginEmbedderPolicy(
return false;

// > 4. If ownerPolicy's report-only value is "require-corp" or
// "cors-or-credentialless" and policy's value is "unsafe-none", then queue a
// "credentialless" and policy's value is "unsafe-none", then queue a
// cross-origin embedder policy inheritance violation with response, "worker
// initialization", owner's policy's report only reporting endpoint,
// "reporting", and owner.
Expand All @@ -452,7 +452,7 @@ bool DedicatedWorkerHost::CheckCrossOriginEmbedderPolicy(
}

// > 5. If ownerPolicy's value is "unsafe-none" or policy's value is
// "require-corp" or "cors-or-credentialless", then return true.
// "require-corp" or "credentialless", then return true.
if (!network::CompatibleWithCrossOriginIsolated(
creator_cross_origin_embedder_policy) ||
network::CompatibleWithCrossOriginIsolated(
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ bool CompatibleWithCrossOriginIsolated(
switch (value) {
case mojom::CrossOriginEmbedderPolicyValue::kNone:
return false;
case mojom::CrossOriginEmbedderPolicyValue::kCorsOrCredentialless:
case mojom::CrossOriginEmbedderPolicyValue::kCredentialless:
case mojom::CrossOriginEmbedderPolicyValue::kRequireCorp:
return true;
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -47,9 +47,9 @@ Parse(base::StringPiece header_value) {

if (base::FeatureList::IsEnabled(
features::kCrossOriginEmbedderPolicyCredentialless) &&
item->item.GetString() == "cors-or-credentialless") {
item->item.GetString() == "credentialless") {
return {
mojom::CrossOriginEmbedderPolicyValue::kCorsOrCredentialless,
mojom::CrossOriginEmbedderPolicyValue::kCredentialless,
std::move(endpoint),
};
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,8 +19,8 @@ namespace network {
namespace {

constexpr auto kNone = mojom::CrossOriginEmbedderPolicyValue::kNone;
constexpr auto kCorsOrCredentialless =
mojom::CrossOriginEmbedderPolicyValue::kCorsOrCredentialless;
constexpr auto kCredentialless =
mojom::CrossOriginEmbedderPolicyValue::kCredentialless;
constexpr auto kRequireCorp =
mojom::CrossOriginEmbedderPolicyValue::kRequireCorp;
const auto kNoHeader = base::Optional<std::string>();
Expand Down Expand Up @@ -111,8 +111,7 @@ TEST(CrossOriginEmbedderPolicyTest, Parse) {

// Errors
{"REQUIRE-CORP", kNoHeader, kNone, kNoEndpoint, kNone, kNoEndpoint},
{"CORS-OR-CREDENTIALLESS", kNoHeader, kNone, kNoEndpoint, kNone,
kNoEndpoint},
{"CREDENTIALLESS", kNoHeader, kNone, kNoEndpoint, kNone, kNoEndpoint},
{"credentialless", kNoHeader, kNone, kNoEndpoint, kNone, kNoEndpoint},
{" require-corp; REPORT-TO=\"endpoint\"", kNoHeader, kNone, kNoEndpoint,
kNone, kNoEndpoint},
Expand Down Expand Up @@ -140,22 +139,20 @@ TEST(CrossOriginEmbedderPolicyTest, ParseCredentiallessDisabled) {
scoped_feature_list.InitWithFeatures(
{}, {features::kCrossOriginEmbedderPolicyCredentialless});
TestCase test_cases[] = {
// COEP: cors-or-credentialless
{"cors-or-credentialless", kNoHeader, kNone, kNoEndpoint, kNone,
kNoEndpoint},
// COEP-RO: cors-or-credentialless
{kNoHeader, "cors-or-credentialless", kNone, kNoEndpoint, kNone,
kNoEndpoint},
// COEP: cors-or-credentialless with reporting endpoint
{"cors-or-credentialless; report-to=\"endpoint\"", kNoHeader, kNone,
kNoEndpoint, kNone, kNoEndpoint},
// COEP-RO: cors-or-credentialless with reporting endpoint
{kNoHeader, "cors-or-credentialless; report-to=\"endpoint\"", kNone,
kNoEndpoint, kNone, kNoEndpoint},
// With both headers
{"cors-or-credentialless; report-to=\"endpoint1\"",
"cors-or-credentialless; report-to=\"endpoint2\"", kNone, kNoEndpoint,
// COEP: credentialless
{"credentialless", kNoHeader, kNone, kNoEndpoint, kNone, kNoEndpoint},
// COEP-RO: credentialless
{kNoHeader, "credentialless", kNone, kNoEndpoint, kNone, kNoEndpoint},
// COEP: credentialless with reporting endpoint
{"credentialless; report-to=\"endpoint\"", kNoHeader, kNone, kNoEndpoint,
kNone, kNoEndpoint},
// COEP-RO: credentialless with reporting endpoint
{kNoHeader, "credentialless; report-to=\"endpoint\"", kNone, kNoEndpoint,
kNone, kNoEndpoint},
// With both headers
{"credentialless; report-to=\"endpoint1\"",
"credentialless; report-to=\"endpoint2\"", kNone, kNoEndpoint, kNone,
kNoEndpoint},
};
for (const TestCase& test_case : test_cases)
CheckTestCase(test_case);
Expand All @@ -166,22 +163,22 @@ TEST(CrossOriginEmbedderPolicyTest, ParseCredentiallessEnabled) {
scoped_feature_list.InitWithFeatures(
{features::kCrossOriginEmbedderPolicyCredentialless}, {});
TestCase test_cases[] = {
// COEP: cors-or-credentialless
{"cors-or-credentialless", kNoHeader, kCorsOrCredentialless, kNoEndpoint,
kNone, kNoEndpoint},
// COEP-RO: cors-or-credentialless
{kNoHeader, "cors-or-credentialless", kNone, kNoEndpoint,
kCorsOrCredentialless, kNoEndpoint},
// COEP: cors-or-credentialless with reporting endpoint
{"cors-or-credentialless; report-to=\"endpoint\"", kNoHeader,
kCorsOrCredentialless, "endpoint", kNone, kNoEndpoint},
// COEP-RO: cors-or-credentialless with reporting endpoint
{kNoHeader, "cors-or-credentialless; report-to=\"endpoint\"", kNone,
kNoEndpoint, kCorsOrCredentialless, "endpoint"},
// COEP: credentialless
{"credentialless", kNoHeader, kCredentialless, kNoEndpoint, kNone,
kNoEndpoint},
// COEP-RO: credentialless
{kNoHeader, "credentialless", kNone, kNoEndpoint, kCredentialless,
kNoEndpoint},
// COEP: credentialless with reporting endpoint
{"credentialless; report-to=\"endpoint\"", kNoHeader, kCredentialless,
"endpoint", kNone, kNoEndpoint},
// COEP-RO: credentialless with reporting endpoint
{kNoHeader, "credentialless; report-to=\"endpoint\"", kNone, kNoEndpoint,
kCredentialless, "endpoint"},
// With both headers
{"cors-or-credentialless; report-to=\"endpoint1\"",
"cors-or-credentialless; report-to=\"endpoint2\"", kCorsOrCredentialless,
"endpoint1", kCorsOrCredentialless, "endpoint2"},
{"credentialless; report-to=\"endpoint1\"",
"credentialless; report-to=\"endpoint2\"", kCredentialless, "endpoint1",
kCredentialless, "endpoint2"},
};

for (const TestCase& test_case : test_cases)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -156,7 +156,7 @@ base::Optional<mojom::BlockedByResponseReason> IsBlockedInternal(
bool require_corp =
embedder_policy == mojom::CrossOriginEmbedderPolicyValue::kRequireCorp ||
(embedder_policy ==
mojom::CrossOriginEmbedderPolicyValue::kCorsOrCredentialless &&
mojom::CrossOriginEmbedderPolicyValue::kCredentialless &&
request_mode == mojom::RequestMode::kNavigate);

// COEP https://mikewest.github.io/corpp/#corp-check
Expand Down
2 changes: 1 addition & 1 deletion services/network/public/cpp/features.cc
Original file line number Diff line number Diff line change
Expand Up @@ -76,7 +76,7 @@ const base::Feature kProactivelyThrottleLowPriorityRequests{
"ProactivelyThrottleLowPriorityRequests",
base::FEATURE_DISABLED_BY_DEFAULT};

// Enables Cross-Origin-Embedder-Policy: cors-or-credentialless.
// Enables Cross-Origin-Embedder-Policy: credentialless.
// https://github.com/mikewest/credentiallessness
COMPONENT_EXPORT(NETWORK_CPP)
extern const base::Feature kCrossOriginEmbedderPolicyCredentialless{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ import "services/network/public/mojom/fetch_api.mojom";
// https://mikewest.github.io/corpp/#integration-html
enum CrossOriginEmbedderPolicyValue {
kNone,
kCorsOrCredentialless,
kCredentialless,
kRequireCorp,
};

Expand Down
4 changes: 1 addition & 3 deletions services/network/url_loader.cc
Original file line number Diff line number Diff line change
Expand Up @@ -2410,10 +2410,8 @@ bool URLLoader::CoepAllowCredentials(const GURL& url) {
? factory_params_->client_security_state->cross_origin_embedder_policy
.value
: mojom::CrossOriginEmbedderPolicyValue::kNone;
if (coep_policy !=
mojom::CrossOriginEmbedderPolicyValue::kCorsOrCredentialless) {
if (coep_policy != mojom::CrossOriginEmbedderPolicyValue::kCredentialless)
return true;
}
DCHECK(base::FeatureList::IsEnabled(
features::kCrossOriginEmbedderPolicyCredentialless));

Expand Down
2 changes: 1 addition & 1 deletion services/network/url_loader.h
Original file line number Diff line number Diff line change
Expand Up @@ -400,7 +400,7 @@ class COMPONENT_EXPORT(NETWORK_SERVICE) URLLoader
// Returns whether sending/storing credentials is allowed by COEP.
// |url| is the latest request URL, either the original URL or
// `redirect_info.new_url`.
// When Cross-Origin-Embedder-Policy: cors-or-credentialless is set, do not
// When Cross-Origin-Embedder-Policy: credentialless is set, do not
// send or store credentials for no-cors cross-origin request.
bool CoepAllowCredentials(const GURL& url);

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3193,7 +3193,7 @@ enum WebFeature {
kPrefixedStorageQuotaThirdPartyContext = 3878,
kRequestedFileSystemPersistentThirdPartyContext = 3879,
kPrefixedStorageInfoThirdPartyContext = 3880,
kCrossOriginEmbedderPolicyCorsOrCredentialless = 3881,
kCrossOriginEmbedderPolicyCredentialless = 3881,
kPostMessageFromSecureToSecure = 3882,
kPostMessageFromInsecureToInsecure = 3883,
kWebAppManifestProtocolHandlers = 3884,
Expand Down
2 changes: 0 additions & 2 deletions third_party/blink/web_tests/TestExpectations
Original file line number Diff line number Diff line change
Expand Up @@ -1936,8 +1936,6 @@ crbug.com/694525 external/wpt/content-security-policy/connect-src/worker-connect
crbug.com/694525 external/wpt/content-security-policy/navigation/to-javascript-parent-initiated-child-csp.html [ Skip ]
crbug.com/694525 external/wpt/content-security-policy/unsafe-eval/eval-blocked-in-about-blank-iframe.sub.html [ Skip ]

crbug.com/1199754 virtual/plz-dedicated-worker/external/wpt/html/cross-origin-embedder-policy/credentialless/cors-or-credentialless/dedicated-worker.tentative.https.html [ Timeout ]

# These tests will be added back soon:
crbug.com/706350 external/wpt/html/browsers/browsing-the-web/history-traversal/window-name-after-cross-origin-aux-frame-navigation.sub.html [ Skip ]
crbug.com/706350 external/wpt/html/browsers/browsing-the-web/history-traversal/window-name-after-cross-origin-main-frame-navigation.sub.html [ Skip ]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -879,13 +879,13 @@ crbug.com/1050754 external/wpt/html/canvas/offscreen/text/2d.text.measure.baseli
crbug.com/1050754 external/wpt/html/canvas/offscreen/text/2d.text.measure.fontBoundingBox.html [ Failure ]
crbug.com/1050754 external/wpt/html/canvas/offscreen/text/2d.text.measure.fontBoundingBox.worker.html [ Failure ]
crbug.com/1050754 external/wpt/html/canvas/offscreen/the-offscreen-canvas/2d.getcontext.extraargs.worker.html [ Pass ]
crbug.com/1050754 external/wpt/html/cross-origin-embedder-policy/credentialless/cors-or-credentialless/fetch.tentative.https.html [ Failure Pass ]
crbug.com/1050754 external/wpt/html/cross-origin-embedder-policy/credentialless/cors-or-credentialless/iframe.tentative.html [ Failure Pass ]
crbug.com/1050754 external/wpt/html/cross-origin-embedder-policy/credentialless/cors-or-credentialless/image.tentative.https.html [ Crash Failure Pass ]
crbug.com/1050754 external/wpt/html/cross-origin-embedder-policy/credentialless/cors-or-credentialless/link.tentative.https.html [ Crash Failure Pass ]
crbug.com/1050754 external/wpt/html/cross-origin-embedder-policy/credentialless/cors-or-credentialless/redirect.tentative.html [ Failure Pass ]
crbug.com/1050754 external/wpt/html/cross-origin-embedder-policy/credentialless/cors-or-credentialless/script.tentative.https.html [ Crash Failure Pass ]
crbug.com/1050754 external/wpt/html/cross-origin-embedder-policy/credentialless/cors-or-credentialless/video.tentative.https.html [ Crash Timeout ]
crbug.com/1050754 external/wpt/html/cross-origin-embedder-policy/credentialless/fetch.tentative.https.html [ Failure Pass ]
crbug.com/1050754 external/wpt/html/cross-origin-embedder-policy/credentialless/iframe.tentative.html [ Failure Pass ]
crbug.com/1050754 external/wpt/html/cross-origin-embedder-policy/credentialless/image.tentative.https.html [ Crash Failure Pass ]
crbug.com/1050754 external/wpt/html/cross-origin-embedder-policy/credentialless/link.tentative.https.html [ Crash Failure Pass ]
crbug.com/1050754 external/wpt/html/cross-origin-embedder-policy/credentialless/redirect.tentative.html [ Failure Pass ]
crbug.com/1050754 external/wpt/html/cross-origin-embedder-policy/credentialless/script.tentative.https.html [ Crash Failure Pass ]
crbug.com/1050754 external/wpt/html/cross-origin-embedder-policy/credentialless/video.tentative.https.html [ Crash Timeout ]
crbug.com/1050754 external/wpt/html/cross-origin-embedder-policy/reporting-navigation.https.html [ Failure Pass ]
crbug.com/1050754 external/wpt/html/cross-origin-embedder-policy/reporting-subresource-corp.https.html [ Crash Failure ]
crbug.com/1050754 external/wpt/html/cross-origin-opener-policy/coep-navigate-popup.https.html?0-1 [ Timeout ]
Expand Down
Loading

0 comments on commit 69edb0b

Please sign in to comment.