diff --git a/source b/source index 12c5dfaef0a..4a1efaaf0bc 100644 --- a/source +++ b/source @@ -2495,6 +2495,7 @@ a.setAttribute('href', 'https://example.com/'); // change the content attribute
  • safely extracting a body
  • processResponseConsumeBody
  • processResponseEndOfBody
  • +
  • network-partition-keys
  • response and its @@ -30891,6 +30892,7 @@ href="?audio">audio</a> test instead.)</p>
    height
    referrerpolicy
    loading
    +
    credentialless
    Accessibility considerations:
    For authors.
    @@ -30911,6 +30913,7 @@ interface HTMLIFrameElement : HTMLElement { [CEReactions] attribute DOMString height; [CEReactions] attribute DOMString referrerPolicy; [CEReactions] attribute DOMString loading; + attribute boolean credentialless; readonly attribute Document? contentDocument; readonly attribute WindowProxy? contentWindow; Document? getSVGDocument(); @@ -31601,6 +31604,13 @@ interface HTMLIFrameElement : HTMLElement {
  • Invoke resumptionSteps.

  • +
    + +

    The credentialless + attribute, enables loading documents hosted by the iframe with a new and ephemeral + storage partition. It is a boolean value. The default is false.

    +

    Descendants of iframe elements represent nothing. (In legacy user agents that do @@ -31619,9 +31629,10 @@ interface HTMLIFrameElement : HTMLElement { data-x="dom-iframe-src">src, srcdoc, name, sandbox, and allow must reflect the respective content - attributes of the same name.

    + data-x="dom-iframe-sandbox">sandbox, allow , and credentialless , must reflect the + respective content attributes of the same name.

    The supported tokens for sandbox's DOMTokenList are the allowed @@ -80362,6 +80373,10 @@ popup4.close();

  • Let sandboxFlags be the result of determining the creation sandboxing flags given browsingContext and embedder.

  • +
  • Let credentialless be the result of determining the initial window credentialless flag, given + browsingContext.

  • +