Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow permission requests within the same eTLD+1 #13564

Closed
wants to merge 1 commit into from

Conversation

bbondy
Copy link
Member

@bbondy bbondy commented Jun 1, 2022

Resolves brave/brave-browser#23142

Submitter Checklist:

  • I confirm that no security/privacy review is needed, or that I have requested one
  • There is a ticket for my issue
  • Used Github auto-closing keywords in the PR description above
  • Wrote a good PR/commit description
  • Squashed any review feedback or "fixup" commits before merge, so that history is a record of what happened in the repo, not your PR
  • Added appropriate labels (QA/Yes or QA/No; release-notes/include or release-notes/exclude; OS/...) to the associated issue
  • Checked the PR locally: npm run test -- brave_browser_tests, npm run test -- brave_unit_tests, npm run lint, npm run gn_check, npm run tslint
  • Ran git rebase master (if needed)

Reviewer Checklist:

  • A security review is not needed, or a link to one is included in the PR description
  • New files have MPL-2.0 license header
  • Adequate test coverage exists to prevent regressions
  • Major classes, functions and non-trivial code blocks are well-commented
  • Changes in component dependencies are properly reflected in gn
  • Code follows the style guide
  • Test plan is specified in PR before merging

After-merge Checklist:

Test Plan:

@bbondy bbondy requested a review from darkdh June 1, 2022 16:43
@bbondy bbondy requested review from a team as code owners June 1, 2022 16:43
@bbondy bbondy self-assigned this Jun 1, 2022
Copy link
Member

@darkdh darkdh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm, only one nit left.

EXPECT_FALSE(responses.empty());
}));

content::RunAllTasksUntilIdle();
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

pls use base::RunLoop instead and call Quit in the lambda.

Copy link
Member Author

@bbondy bbondy Jun 3, 2022

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fixed in 3e1a254

}));

content::RunAllTasksUntilIdle();
EXPECT_FALSE(IsPendingGroupedRequestsEmpty(cases[i].type)) << "case: " << i;
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

can also write it like this, seems okay to distinguish cases by the wallet address:

for (const auto& case : cases) {
  SCOPED_TRACE(testing::PrintToString(case.addresses));
  ...

Copy link
Member Author

@bbondy bbondy Jun 3, 2022

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I didn't know about that, thanks!
Fixed in 3e1a254

@bbondy bbondy force-pushed the ethereum-3p-context branch 2 times, most recently from 6a55c3e to 3e1a254 Compare June 3, 2022 20:03
@bbondy
Copy link
Member Author

bbondy commented Jun 3, 2022

FYI - I removed some debug prints and updated comments to reference the latest hash.

@bbondy bbondy requested review from goodov and darkdh June 3, 2022 20:08
darkdh
darkdh previously approved these changes Jun 3, 2022
Copy link
Member

@darkdh darkdh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

++

goodov
goodov previously approved these changes Jun 6, 2022
original_requesting_origin == url::Origin::Create(embedding_origin)) {
net::registry_controlled_domains::SameDomainOrHost(
original_requesting_origin, url::Origin::Create(embedding_origin),
net::registry_controlled_domains::INCLUDE_PRIVATE_REGISTRIES)) {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

just wanted to double check - embedding_origin is the top level (main frame) origin as opposed to the parent origin? ex: if a.com embeds b.com which embeds c.com and the requesting origin is c.com, embedding origin is a.com not b.com.

@wknapik wknapik dismissed stale reviews from goodov and darkdh via df1ef78 June 23, 2022 14:31
@bbondy
Copy link
Member Author

bbondy commented Jun 28, 2022

Closing in favor of #13783

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Not including wallet providers for 3p iframes breaks ImmutableX
4 participants