Commit 4aaf3416 authored by Zhuoyu Qian's avatar Zhuoyu Qian Committed by Commit Bot

Rename CORS namepsace to cors

https://google.github.io/styleguide/cppguide.html#Namespace_Names
> Namespace names are all lower-case.

This CL has no behavior changes.

Bug: 889726
Change-Id: Ifd7489aeeef3f7249f9d0c7c56456c6d0bb3f445
Reviewed-on: https://chromium-review.googlesource.com/c/1328635Reviewed-by: default avatarKent Tamura <tkent@chromium.org>
Commit-Queue: Zhuoyu Qian <zhuoyu.qian@samsung.com>
Cr-Commit-Position: refs/heads/master@{#607075}
parent b1d355cb
......@@ -84,7 +84,7 @@ class HTTPRequestHeaderValidator : public WebHTTPHeaderVisitor {
void HTTPRequestHeaderValidator::VisitHeader(const WebString& name,
const WebString& value) {
is_safe_ = is_safe_ && IsValidHTTPToken(name) &&
!CORS::IsForbiddenHeaderName(name) &&
!cors::IsForbiddenHeaderName(name) &&
IsValidHTTPHeaderValue(value);
}
......
......@@ -643,7 +643,7 @@ void FetchManager::Loader::LoadSucceeded() {
if (GetDocument() && GetDocument()->GetFrame() &&
GetDocument()->GetFrame()->GetPage() &&
CORS::IsOkStatus(response_http_status_code_)) {
cors::IsOkStatus(response_http_status_code_)) {
GetDocument()->GetFrame()->GetPage()->GetChromeClient().AjaxSucceeded(
GetDocument()->GetFrame());
}
......@@ -835,7 +835,7 @@ void FetchManager::Loader::PerformHTTPFetch(ExceptionState& exception_state) {
// Since |fetch_request_data_|'s headers are populated with either of the
// "request" guard or "request-no-cors" guard, we can assume that none of
// the headers have a name listed in the forbidden header names.
DCHECK(!CORS::IsForbiddenHeaderName(header.first));
DCHECK(!cors::IsForbiddenHeaderName(header.first));
request.AddHTTPHeaderField(AtomicString(header.first),
AtomicString(header.second));
......@@ -863,8 +863,8 @@ void FetchManager::Loader::PerformHTTPFetch(ExceptionState& exception_state) {
request.SetSkipServiceWorker(is_isolated_world_);
if (fetch_request_data_->Keepalive()) {
if (!CORS::IsCORSSafelistedMethod(request.HttpMethod()) ||
!CORS::ContainsOnlyCORSSafelistedOrForbiddenHeaders(
if (!cors::IsCORSSafelistedMethod(request.HttpMethod()) ||
!cors::ContainsOnlyCORSSafelistedOrForbiddenHeaders(
request.HttpHeaderFields())) {
PerformNetworkError(
"Preflight request for request with keepalive "
......
......@@ -95,12 +95,12 @@ void Headers::append(const String& name,
}
// "4. Otherwise, if guard is |request| and |name| is a forbidden header
// name, return."
if (guard_ == kRequestGuard && CORS::IsForbiddenHeaderName(name))
if (guard_ == kRequestGuard && cors::IsForbiddenHeaderName(name))
return;
// "5. Otherwise, if guard is |request-no-CORS| and |name|/|value| is not a
// no-CORS-safelisted header, return."
if (guard_ == kRequestNoCORSGuard &&
!CORS::IsNoCORSSafelistedHeader(name, normalized_value)) {
!cors::IsNoCORSSafelistedHeader(name, normalized_value)) {
return;
}
// "6. Otherwise, if guard is |response| and |name| is a forbidden response
......@@ -127,12 +127,12 @@ void Headers::remove(const String& name, ExceptionState& exception_state) {
}
// "3. Otherwise, if guard is |request| and |name| is a forbidden header
// name, return."
if (guard_ == kRequestGuard && CORS::IsForbiddenHeaderName(name))
if (guard_ == kRequestGuard && cors::IsForbiddenHeaderName(name))
return;
// "4. Otherwise, if guard is |request-no-CORS| and |name|/`invalid` is not
// a no-CORS-safelisted header, return."
if (guard_ == kRequestNoCORSGuard &&
!CORS::IsNoCORSSafelistedHeader(name, "invalid")) {
!cors::IsNoCORSSafelistedHeader(name, "invalid")) {
return;
}
// "5. Otherwise, if guard is |response| and |name| is a forbidden response
......@@ -195,12 +195,12 @@ void Headers::set(const String& name,
}
// "4. Otherwise, if guard is |request| and |name| is a forbidden header
// name, return."
if (guard_ == kRequestGuard && CORS::IsForbiddenHeaderName(name))
if (guard_ == kRequestGuard && cors::IsForbiddenHeaderName(name))
return;
// "5. Otherwise, if guard is |request-no-CORS| and |name|/|value| is not a
// no-CORS-safelisted header, return."
if (guard_ == kRequestNoCORSGuard &&
!CORS::IsNoCORSSafelistedHeader(name, normalized_value)) {
!cors::IsNoCORSSafelistedHeader(name, normalized_value)) {
return;
}
// "6. Otherwise, if guard is |response| and |name| is a forbidden response
......
......@@ -477,7 +477,7 @@ Request* Request::CreateRequestWithRequestOrString(
if (r->GetRequest()->Mode() == network::mojom::FetchRequestMode::kNoCORS) {
// "If |r|'s request's method is not a CORS-safelisted method, throw a
// TypeError."
if (!CORS::IsCORSSafelistedMethod(r->GetRequest()->Method())) {
if (!cors::IsCORSSafelistedMethod(r->GetRequest()->Method())) {
exception_state.ThrowTypeError("'" + r->GetRequest()->Method() +
"' is unsupported in no-cors mode.");
return nullptr;
......
......@@ -411,7 +411,7 @@ unsigned short Response::status() const {
bool Response::ok() const {
// "The ok attribute's getter must return true
// if response's status is in the range 200 to 299, and false otherwise."
return CORS::IsOkStatus(status());
return cors::IsOkStatus(status());
}
String Response::statusText() const {
......
......@@ -324,7 +324,7 @@ BaseFetchContext::CanRequestInternal(
}
if (request_mode == network::mojom::FetchRequestMode::kSameOrigin &&
CORS::CalculateCORSFlag(url, origin.get(), request_mode)) {
cors::CalculateCORSFlag(url, origin.get(), request_mode)) {
PrintAccessDeniedMessage(url);
return ResourceRequestBlockedReason::kOrigin;
}
......
......@@ -732,7 +732,7 @@ void DocumentLoader::ResponseReceived(
}
if (frame_->Owner() && response_.IsHTTP() &&
!CORS::IsOkStatus(response_.HttpStatusCode()))
!cors::IsOkStatus(response_.HttpStatusCode()))
frame_->Owner()->RenderFallbackContent(frame_);
}
......
......@@ -43,7 +43,7 @@ bool ModuleScriptFetcher::WasModuleLoadSuccessful(
const auto& response = resource->GetResponse();
// - response's status is not an ok status
if (response.IsHTTP() && !CORS::IsOkStatus(response.HttpStatusCode())) {
if (response.IsHTTP() && !cors::IsOkStatus(response.HttpStatusCode())) {
return false;
}
......
......@@ -79,7 +79,7 @@ namespace {
// Fetch API Spec: https://fetch.spec.whatwg.org/#cors-preflight-fetch-0
AtomicString CreateAccessControlRequestHeadersHeader(
const HTTPHeaderMap& headers) {
Vector<String> filtered_headers = CORS::CORSUnsafeRequestHeaderNames(headers);
Vector<String> filtered_headers = cors::CORSUnsafeRequestHeaderNames(headers);
if (!filtered_headers.size())
return g_null_atom;
......@@ -223,7 +223,7 @@ void ThreadableLoader::Start(const ResourceRequest& request) {
DCHECK(async_ || request.HttpReferrer().IsEmpty());
bool cors_enabled =
CORS::IsCORSEnabledRequestMode(request.GetFetchRequestMode());
cors::IsCORSEnabledRequestMode(request.GetFetchRequestMode());
// kPreventPreflight can be used only when the CORS is enabled.
DCHECK(request.CORSPreflightPolicy() ==
......@@ -241,7 +241,7 @@ void ThreadableLoader::Start(const ResourceRequest& request) {
network::mojom::FetchRequestMode::kNoCORS) {
SECURITY_CHECK(WebCORS::IsNoCORSAllowedContext(request_context_));
}
cors_flag_ = CORS::CalculateCORSFlag(request.Url(), GetSecurityOrigin(),
cors_flag_ = cors::CalculateCORSFlag(request.Url(), GetSecurityOrigin(),
request.GetFetchRequestMode());
// The CORS flag variable is not yet used at the step in the spec that
......@@ -328,7 +328,7 @@ void ThreadableLoader::Start(const ResourceRequest& request) {
return;
}
if (CORS::IsCORSEnabledRequestMode(request.GetFetchRequestMode())) {
if (cors::IsCORSEnabledRequestMode(request.GetFetchRequestMode())) {
// Save the request to fallback_request_for_service_worker to use when the
// service worker doesn't handle (call respondWith()) a CORS enabled
// request.
......@@ -346,7 +346,7 @@ void ThreadableLoader::DispatchInitialRequest(ResourceRequest& request) {
return;
}
DCHECK(CORS::IsCORSEnabledRequestMode(request.GetFetchRequestMode()) ||
DCHECK(cors::IsCORSEnabledRequestMode(request.GetFetchRequestMode()) ||
request.IsExternalRequest());
MakeCrossOriginAccessRequest(request);
......@@ -386,7 +386,7 @@ void ThreadableLoader::LoadPreflightRequest(
void ThreadableLoader::MakeCrossOriginAccessRequest(
const ResourceRequest& request) {
DCHECK(CORS::IsCORSEnabledRequestMode(request.GetFetchRequestMode()) ||
DCHECK(cors::IsCORSEnabledRequestMode(request.GetFetchRequestMode()) ||
request.IsExternalRequest());
DCHECK(client_);
DCHECK(!GetResource());
......@@ -447,8 +447,8 @@ void ThreadableLoader::MakeCrossOriginAccessRequest(
// the user's input). For example, referrer. We need to accept them. For
// security, we must reject forbidden headers/methods at the point we
// accept user's input. Not here.
if (CORS::IsCORSSafelistedMethod(request.HttpMethod()) &&
CORS::ContainsOnlyCORSSafelistedOrForbiddenHeaders(
if (cors::IsCORSSafelistedMethod(request.HttpMethod()) &&
cors::ContainsOnlyCORSSafelistedOrForbiddenHeaders(
request.HttpHeaderFields())) {
PrepareCrossOriginRequest(cross_origin_request);
LoadRequest(cross_origin_request, cross_origin_options);
......@@ -465,7 +465,7 @@ void ThreadableLoader::MakeCrossOriginAccessRequest(
probe::shouldForceCORSPreflight(execution_context_,
&should_ignore_preflight_cache);
if (should_ignore_preflight_cache ||
!CORS::CheckIfRequestCanSkipPreflight(
!cors::CheckIfRequestCanSkipPreflight(
GetSecurityOrigin()->ToString(), cross_origin_request.Url(),
cross_origin_request.GetFetchCredentialsMode(),
cross_origin_request.HttpMethod(),
......@@ -589,7 +589,7 @@ bool ThreadableLoader::RedirectReceived(
}
if (cors_flag_) {
if (const auto error_status = CORS::CheckAccess(
if (const auto error_status = cors::CheckAccess(
original_url, redirect_response.HttpStatusCode(),
redirect_response.HttpHeaderFields(),
new_request.GetFetchCredentialsMode(), *GetSecurityOrigin())) {
......@@ -635,11 +635,11 @@ bool ThreadableLoader::RedirectReceived(
// Allow same origin requests to continue after allowing clients to audit
// the redirect.
if (!(cors_flag_ ||
CORS::CalculateCORSFlag(new_url, GetSecurityOrigin(),
cors::CalculateCORSFlag(new_url, GetSecurityOrigin(),
new_request.GetFetchRequestMode()))) {
bool follow =
client_->WillFollowRedirect(new_url, redirect_response_to_pass);
response_tainting_ = CORS::CalculateResponseTainting(
response_tainting_ = cors::CalculateResponseTainting(
new_url, new_request.GetFetchRequestMode(), GetSecurityOrigin(),
CORSFlag::Unset);
return follow;
......@@ -652,7 +652,7 @@ bool ThreadableLoader::RedirectReceived(
: nullptr,
redirect_response_to_pass, resource);
if (auto error_status = CORS::CheckRedirectLocation(
if (auto error_status = cors::CheckRedirectLocation(
new_url, fetch_request_mode_, GetSecurityOrigin(),
cors_flag_ ? CORSFlag::Set : CORSFlag::Unset)) {
DispatchDidFail(ResourceError(original_url, *error_status));
......@@ -767,7 +767,7 @@ void ThreadableLoader::DidDownloadToBlob(Resource* resource,
void ThreadableLoader::HandlePreflightResponse(
const ResourceResponse& response) {
base::Optional<network::CORSErrorStatus> cors_error_status =
CORS::CheckPreflightAccess(response.Url(), response.HttpStatusCode(),
cors::CheckPreflightAccess(response.Url(), response.HttpStatusCode(),
response.HttpHeaderFields(),
actual_request_.GetFetchCredentialsMode(),
*GetSecurityOrigin());
......@@ -777,7 +777,7 @@ void ThreadableLoader::HandlePreflightResponse(
}
base::Optional<network::mojom::CORSError> preflight_error =
CORS::CheckPreflight(response.HttpStatusCode());
cors::CheckPreflight(response.HttpStatusCode());
if (preflight_error) {
HandlePreflightFailure(response.Url(),
network::CORSErrorStatus(*preflight_error));
......@@ -786,7 +786,7 @@ void ThreadableLoader::HandlePreflightResponse(
base::Optional<network::CORSErrorStatus> error_status;
if (actual_request_.IsExternalRequest()) {
error_status = CORS::CheckExternalPreflight(response.HttpHeaderFields());
error_status = cors::CheckExternalPreflight(response.HttpHeaderFields());
if (error_status) {
HandlePreflightFailure(response.Url(), *error_status);
return;
......@@ -794,7 +794,7 @@ void ThreadableLoader::HandlePreflightResponse(
}
String access_control_error_description;
error_status = CORS::EnsurePreflightResultAndCacheOnSuccess(
error_status = cors::EnsurePreflightResultAndCacheOnSuccess(
response.HttpHeaderFields(), GetSecurityOrigin()->ToString(),
actual_request_.Url(), actual_request_.HttpMethod(),
actual_request_.HttpHeaderFields(),
......@@ -890,7 +890,7 @@ void ThreadableLoader::ResponseReceived(
fallback_request_for_service_worker_ = ResourceRequest();
if (cors_flag_) {
base::Optional<network::CORSErrorStatus> access_error = CORS::CheckAccess(
base::Optional<network::CORSErrorStatus> access_error = cors::CheckAccess(
response.Url(), response.HttpStatusCode(), response.HttpHeaderFields(),
fetch_credentials_mode_, *GetSecurityOrigin());
if (access_error) {
......@@ -1021,7 +1021,7 @@ void ThreadableLoader::HandlePreflightFailure(
void ThreadableLoader::DispatchDidFail(const ResourceError& error) {
if (!out_of_blink_cors_ && error.CORSErrorStatus()) {
String message = CORS::GetErrorString(
String message = cors::GetErrorString(
*error.CORSErrorStatus(), initial_request_url_, last_request_url_,
*GetSecurityOrigin(), ResourceType::kRaw,
resource_loader_options_.initiator_info.name);
......@@ -1050,10 +1050,10 @@ void ThreadableLoader::LoadRequest(
}
} else {
if (actual_request_.IsNull()) {
response_tainting_ = CORS::CalculateResponseTainting(
response_tainting_ = cors::CalculateResponseTainting(
request.Url(), request.GetFetchRequestMode(), GetSecurityOrigin(),
cors_flag_ ? CORSFlag::Set : CORSFlag::Unset);
request.SetAllowStoredCredentials(CORS::CalculateCredentialsFlag(
request.SetAllowStoredCredentials(cors::CalculateCredentialsFlag(
request.GetFetchCredentialsMode(), response_tainting_));
} else {
request.SetAllowStoredCredentials(false);
......
......@@ -1042,8 +1042,8 @@ void XMLHttpRequest::CreateRequest(scoped_refptr<EncodedFormData> http_body,
// in case the upload listeners are added after the request is started.
upload_events_allowed_ =
same_origin_request_ || upload_events ||
!CORS::IsCORSSafelistedMethod(method_) ||
!CORS::ContainsOnlyCORSSafelistedHeaders(request_headers_);
!cors::IsCORSSafelistedMethod(method_) ||
!cors::ContainsOnlyCORSSafelistedHeaders(request_headers_);
ResourceRequest request(url_);
request.SetRequestorOrigin(GetSecurityOrigin());
......@@ -1414,7 +1414,7 @@ void XMLHttpRequest::setRequestHeader(const AtomicString& name,
// "5. Terminate these steps if |name| is a forbidden header name."
// No script (privileged or not) can set unsafe headers.
if (CORS::IsForbiddenHeaderName(name)) {
if (cors::IsForbiddenHeaderName(name)) {
LogConsoleError(GetExecutionContext(),
"Refused to set unsafe header \"" + name + "\"");
return;
......@@ -1726,7 +1726,7 @@ void XMLHttpRequest::EndLoading() {
return;
if (GetDocument() && GetDocument()->GetFrame() &&
GetDocument()->GetFrame()->GetPage() && CORS::IsOkStatus(status()))
GetDocument()->GetFrame()->GetPage() && cors::IsOkStatus(status()))
GetDocument()->GetFrame()->GetPage()->GetChromeClient().AjaxSucceeded(
GetDocument()->GetFrame());
}
......
......@@ -88,7 +88,7 @@ bool NavigatorBeacon::SendBeaconImpl(
data.GetAsArrayBufferView().View());
} else if (data.IsBlob()) {
Blob* blob = data.GetAsBlob();
if (!CORS::IsCORSSafelistedContentType(blob->type())) {
if (!cors::IsCORSSafelistedContentType(blob->type())) {
UseCounter::Count(context,
WebFeature::kSendBeaconWithNonSimpleContentType);
if (RuntimeEnabledFeatures::
......
......@@ -77,7 +77,7 @@ url::Origin AsUrlOrigin(const SecurityOrigin& origin) {
} // namespace
namespace CORS {
namespace cors {
base::Optional<network::CORSErrorStatus> CheckAccess(
const KURL& response_url,
......@@ -303,6 +303,6 @@ bool CalculateCORSFlag(const KURL& url,
return !origin->CanReadContent(url);
}
} // namespace CORS
} // namespace cors
} // namespace blink
......@@ -25,7 +25,7 @@ enum class CORSFlag : uint8_t {
};
// CORS related utility functions.
namespace CORS {
namespace cors {
// Thin wrapper functions below are for calling ::network::cors functions from
// Blink core. Once Out-of-renderer CORS is enabled, following functions will
......@@ -115,7 +115,7 @@ PLATFORM_EXPORT bool CalculateCORSFlag(
const SecurityOrigin* origin,
network::mojom::FetchRequestMode request_mode);
} // namespace CORS
} // namespace cors
} // namespace blink
......
......@@ -19,7 +19,7 @@
namespace blink {
namespace CORS {
namespace cors {
namespace {
......@@ -209,6 +209,6 @@ String GetErrorString(const network::CORSErrorStatus& status,
return builder.ToString();
}
} // namespace CORS
} // namespace cors
} // namespace blink
......@@ -19,7 +19,7 @@ class SecurityOrigin;
enum class ResourceType : uint8_t;
// CORS error strings related utility functions.
namespace CORS {
namespace cors {
// Stringify CORSError mainly for inspector messages. Generated string should
// not be exposed to JavaScript for security reasons.
......@@ -30,7 +30,7 @@ PLATFORM_EXPORT String GetErrorString(const network::CORSErrorStatus& status,
ResourceType resource_type,
const AtomicString& initiator_name);
} // namespace CORS
} // namespace cors
} // namespace blink
......
......@@ -793,13 +793,13 @@ base::Optional<ResourceRequestBlockedReason> ResourceFetcher::PrepareRequest(
const scoped_refptr<const SecurityOrigin> origin =
resource_request.RequestorOrigin();
DCHECK(!options.cors_flag);
params.MutableOptions().cors_flag = CORS::CalculateCORSFlag(
params.MutableOptions().cors_flag = cors::CalculateCORSFlag(
params.Url(), origin.get(), resource_request.GetFetchRequestMode());
// TODO(yhirano): Reject requests for non CORS-enabled schemes.
// See https://crrev.com/c/1298828.
resource_request.SetAllowStoredCredentials(CORS::CalculateCredentialsFlag(
resource_request.SetAllowStoredCredentials(cors::CalculateCredentialsFlag(
resource_request.GetFetchCredentialsMode(),
CORS::CalculateResponseTainting(
cors::CalculateResponseTainting(
params.Url(), resource_request.GetFetchRequestMode(), origin.get(),
params.Options().cors_flag ? CORSFlag::Set : CORSFlag::Unset)));
}
......
......@@ -393,7 +393,7 @@ void ResourceLoader::Start() {
if (ShouldCheckCORSInResourceLoader()) {
const auto origin = resource_->GetOrigin();
response_tainting_ = CORS::CalculateResponseTainting(
response_tainting_ = cors::CalculateResponseTainting(
request.Url(), request.GetFetchRequestMode(), origin.get(),
GetCORSFlag() ? CORSFlag::Set : CORSFlag::Unset);
}
......@@ -615,12 +615,12 @@ bool ResourceLoader::WillFollowRedirect(
if (ShouldCheckCORSInResourceLoader()) {
scoped_refptr<const SecurityOrigin> origin = resource_->GetOrigin();
base::Optional<network::CORSErrorStatus> cors_error =
CORS::CheckRedirectLocation(
cors::CheckRedirectLocation(
new_url, fetch_request_mode, origin.get(),
GetCORSFlag() ? CORSFlag::Set : CORSFlag::Unset);
if (!cors_error && GetCORSFlag()) {
cors_error =
CORS::CheckAccess(new_url, redirect_response.HttpStatusCode(),
cors::CheckAccess(new_url, redirect_response.HttpStatusCode(),
redirect_response.HttpHeaderFields(),
fetch_credentials_mode, *origin);
}
......@@ -655,7 +655,7 @@ bool ResourceLoader::WillFollowRedirect(
base::Optional<ResourceResponse> redirect_response_with_type;
if (ShouldCheckCORSInResourceLoader()) {
new_request->SetAllowStoredCredentials(CORS::CalculateCredentialsFlag(
new_request->SetAllowStoredCredentials(cors::CalculateCredentialsFlag(
fetch_credentials_mode, response_tainting_));
if (!redirect_response.WasFetchedViaServiceWorker()) {
auto response_type = response_tainting_;
......@@ -721,7 +721,7 @@ bool ResourceLoader::WillFollowRedirect(
if (ShouldCheckCORSInResourceLoader()) {
bool new_cors_flag =
GetCORSFlag() || CORS::CalculateCORSFlag(new_request->Url(),
GetCORSFlag() || cors::CalculateCORSFlag(new_request->Url(),
resource_->GetOrigin().get(),
fetch_request_mode);
resource_->MutableOptions().cors_flag = new_cors_flag;
......@@ -734,7 +734,7 @@ bool ResourceLoader::WillFollowRedirect(
network::mojom::CORSError::kCORSDisabledScheme)));
return false;
}
response_tainting_ = CORS::CalculateResponseTainting(
response_tainting_ = cors::CalculateResponseTainting(
new_request->Url(), fetch_request_mode, resource_->GetOrigin().get(),
GetCORSFlag() ? CORSFlag::Set : CORSFlag::Unset);
}
......@@ -877,7 +877,7 @@ void ResourceLoader::DidReceiveResponse(
!response.WasFetchedViaServiceWorker() &&
!(resource_->IsCacheValidator() && response.HttpStatusCode() == 304)) {
if (GetCORSFlag()) {
base::Optional<network::CORSErrorStatus> cors_error = CORS::CheckAccess(
base::Optional<network::CORSErrorStatus> cors_error = cors::CheckAccess(
response.Url(), response.HttpStatusCode(),
response.HttpHeaderFields(),
initial_request.GetFetchCredentialsMode(), *resource_->GetOrigin());
......@@ -1033,7 +1033,7 @@ void ResourceLoader::HandleError(const ResourceError& error) {
}
if (error.CORSErrorStatus()) {
Context().AddErrorConsoleMessage(
CORS::GetErrorString(
cors::GetErrorString(
*error.CORSErrorStatus(), resource_->GetResourceRequest().Url(),
resource_->LastResourceRequest().Url(), *resource_->GetOrigin(),
resource_->GetType(), resource_->Options().initiator_info.name),
......
......@@ -226,6 +226,7 @@ _CONFIG = [
# Nested namespaces under the blink namespace
'background_scheduler::.+',
'canvas_heuristic_parameters::.+',
'cors::.+',
'css_parsing_utils::.+',
'cssvalue::.+',
'encoding::.+',
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment