-
Lukasz Anforowicz authored
This CL verifies that the browser process will reject attempts that a comprimised foo.com renderer can make in an attempt to show a bar.com URL in the Omnibox. Before this CL, there was already a SecurityExploitBrowserTest.DidCommitInvalidURL test: committing A) bar.com URL with B) origin set to foo.com, C) in a process locked to foo.com. This CL adds DidCommitInvalidURLWithOpaqueOrigin test which tests committing A) bar.com URL, B) with opaque origin derived from foo.com, C) in a process locked to foo.com. Fixed: 918565 Change-Id: I332349e889b83d1cd298050adbf9dca2f55125ba Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2368288 Auto-Submit: Łukasz Anforowicz <lukasza@chromium.org> Reviewed-by:
Nasko Oskov <nasko@chromium.org> Commit-Queue: Łukasz Anforowicz <lukasza@chromium.org> Cr-Commit-Position: refs/heads/master@{#800786}
e2077a9a