You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As described in the Cypress docs, same-origin policy can cause issues with cross-origin iframes etc.
However we don't use cross-origin iframes, navigate to other domains or perform any JS redirects. We're an SPA with client-side routing, and the URL never changes.
So it is unclear why we still need to set chromeWebSecurity: false in our cypress.json config?
Without this setting, when calling cy.visit("/#!/some/route"); (which should not change the origin or do anything with iframes), we get the following error:
Would like to understand why Cypress thinks this is a cross-origin frame.
The text was updated successfully, but these errors were encountered:
On further inspection (after having removed & re-added chromeWebSecurity: false numerous times) is that setting this option controls the --disable-web-security command-line argument when launching Chrome:
As described in the Cypress docs, same-origin policy can cause issues with cross-origin iframes etc.
However we don't use cross-origin iframes, navigate to other domains or perform any JS redirects. We're an SPA with client-side routing, and the URL never changes.
So it is unclear why we still need to set
chromeWebSecurity: false
in ourcypress.json
config?Without this setting, when calling
cy.visit("/#!/some/route");
(which should not change the origin or do anything with iframes), we get the following error:Would like to understand why Cypress thinks this is a cross-origin frame.
The text was updated successfully, but these errors were encountered: