-
-
Notifications
You must be signed in to change notification settings - Fork 203
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Release/118.0.0 #3958
Release/118.0.0 #3958
Conversation
b720757
to
18c2bad
Compare
723d0a5
to
fc90b6f
Compare
fc90b6f
to
a485424
Compare
Co-authored-by: jiexi <jiexiluan@gmail.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
One nit but looks good either way! Great changelog entries.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
QueuedRequestController also needs to be bumped a major
|
||
- **BREAKING:** `setNetworkClientIdForDomain` now throws an error if passed `metamask` for the domain param ([#3908](https://github.com/MetaMask/core/pull/3908)). | ||
- **BREAKING:** `setNetworkClientIdForDomain` now includes a check that the requesting `domain` has already been granted permissions in the `PermissionsController` before adding it to `domains` state and throws an error if the domain does not have permissions ([#3908](https://github.com/MetaMask/core/pull/3908)). | ||
- **BREAKING:** the `domains` state now no longer contains a `metamask` domain key Consumers should instead use the `selectedNetworkClientId` from the `NetworkController` to get the selected network for the `metamask` domain ([#3908](https://github.com/MetaMask/core/pull/3908)). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This in implementation detail heavy. To the end user, getNetworkClientIdForDomain will still passthrough the selectedNetworkClientId, so nothing should be different for the consumer? Do we have consumers accessing SelectedNetworkController state directly?
Co-authored-by: jiexi <jiexiluan@gmail.com>
Co-authored-by: Elliot Winkler <elliot.winkler@gmail.com>
`@metamask/queued-request-controller` was bumped to 0.5.0 in [release 118.0](#3958), but changes that took place since 0.4.0 were not included in the changelog for that release. This commit corrects this.
@metamask/selected-network-controller
[8.0.0]
Changed
setNetworkClientIdForDomain
now throws an error if passedmetamask
as its first (domain
) argument (#3908).setNetworkClientIdForDomain
now includes a check that the requestingdomain
has already been granted permissions in thePermissionsController
before adding it todomains
state and throws an error if the domain does not have permissions (#3908).domains
state now no longer contains ametamask
domain key Consumers should instead use theselectedNetworkClientId
from theNetworkController
to get the selected network for themetamask
domain (#3908).getProviderAndBlockTracker
now throws an error if called with any domain while theperDomainNetwork
flag is false. Consumers should instead use theprovider
andblockTracker
from theNetworkController
when theperDomainNetwork
flag is false (#3908).getProviderAndBlockTracker
now throws an error if called with a domain that is not in domains state (#3908).getNetworkClientIdForDomain
now returns theselectedNetworkClientId
for the globally selected network if theperDomainNetwork
flag is false and if the domain is not in thedomains
state (#3908).Removed
selectedNetworkMiddleware
to set a defaultnetworkClientId
for the requesting origin when not already set. Now if nonetworkClientId
is already set for the requesting origin, the middleware will not add the origin todomains
state but will add thenetworkClientId
currently set for theselectedNetworkClient
from theNetworkController
to the request object (#3908).Fixed
SelectedNetworkController
now listens fornetworkConfiguration
removal events on theNetworkController
and if a removednetworkClientId
matches the setnetworkClientId
for any domains in its state, it updates them to the globally selectednetworkClientId
and repoints the proxies accordingly.(#3926)