|
|
Chromium Code Reviews|
Created:
4 years, 1 month ago by vakh (use Gerrit instead) Modified:
4 years, 1 month ago CC:
woz, chromium-reviews, vakh+watch_chromium.org Target Ref:
refs/pending/heads/master Project:
chromium Visibility:
Public. |
DescriptionFailure to parse full hash metadata shouldn't discard the response. TBR since kcarattini is OOO.
BUG=660133
TBR=kcarattini
Committed: https://crrev.com/4588549b86714ddb6b770a7ef420043c49b6af4e
Cr-Commit-Position: refs/heads/master@{#428218}
Patch Set 1 #Patch Set 2 : Nit: Remove extra return #
Total comments: 8
Patch Set 3 : Nits: Updated comments from nparker@'s review #
Depends on Patchset: Messages
Total messages: 25 (16 generated)
The CQ bit was checked by vakh@chromium.org to run a CQ dry run
vakh@chromium.org changed reviewers: + kcarattini@chromium.org, nparker@chromium.org
Dry run: CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/v2/patch-status/codereview.chromium.or...
Nit: Remove extra return
The CQ bit was checked by vakh@chromium.org to run a CQ dry run
Dry run: CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/v2/patch-status/codereview.chromium.or...
The CQ bit was unchecked by commit-bot@chromium.org
Dry run: This issue passed the CQ dry run.
lgtm https://codereview.chromium.org/2458743003/diff/20001/components/safe_browsin... File components/safe_browsing_db/v4_get_hash_protocol_manager.cc (right): https://codereview.chromium.org/2458743003/diff/20001/components/safe_browsin... components/safe_browsing_db/v4_get_hash_protocol_manager.cc:545: full_hash_infos->push_back(full_hash_info); Do we want to add this full_hash_info if the metadata for it failed to parse? If not, then this CL could be just one line of skipping the push_back if !ParseMetadata. It depends on how the metadata will fail and what the down-stream expectations are of it... I think either way has pros/cons. https://codereview.chromium.org/2458743003/diff/20001/components/safe_browsin... components/safe_browsing_db/v4_get_hash_protocol_manager.cc:578: // TODO: Need to confirm the below key/value pairs with CSD backend. Is this TODO still valid? https://codereview.chromium.org/2458743003/diff/20001/components/safe_browsin... File components/safe_browsing_db/v4_get_hash_protocol_manager.h (right): https://codereview.chromium.org/2458743003/diff/20001/components/safe_browsin... components/safe_browsing_db/v4_get_hash_protocol_manager.h:275: // errors if the metadata information was not parsed correctly or was nit: "Logs errors to UMA if the metadata..." https://codereview.chromium.org/2458743003/diff/20001/components/safe_browsin... File components/safe_browsing_db/v4_get_hash_protocol_manager_unittest.cc (right): https://codereview.chromium.org/2458743003/diff/20001/components/safe_browsin... components/safe_browsing_db/v4_get_hash_protocol_manager_unittest.cc:476: ASSERT_EQ(1ul, full_hash_infos.size()); nit: Add a comment: The PHA threat still remains since it's valid. (same below)
Nits: Updated comments from nparker@'s review
The CQ bit was checked by vakh@chromium.org to run a CQ dry run
Dry run: CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/v2/patch-status/codereview.chromium.or...
https://codereview.chromium.org/2458743003/diff/20001/components/safe_browsin... File components/safe_browsing_db/v4_get_hash_protocol_manager.cc (right): https://codereview.chromium.org/2458743003/diff/20001/components/safe_browsin... components/safe_browsing_db/v4_get_hash_protocol_manager.cc:545: full_hash_infos->push_back(full_hash_info); On 2016/10/27 at 22:06:49, Nathan Parker wrote: > Do we want to add this full_hash_info if the metadata for it failed to parse? If not, then this CL could be just one line of skipping the push_back if !ParseMetadata. > > It depends on how the metadata will fail and what the down-stream expectations are of it... I think either way has pros/cons. Yes, we still want to. See the scenario in: http://crbug.com/660133#c2 https://codereview.chromium.org/2458743003/diff/20001/components/safe_browsin... components/safe_browsing_db/v4_get_hash_protocol_manager.cc:578: // TODO: Need to confirm the below key/value pairs with CSD backend. On 2016/10/27 22:06:49, Nathan Parker wrote: > Is this TODO still valid? Yes, I'll check with the CSD folks. https://codereview.chromium.org/2458743003/diff/20001/components/safe_browsin... File components/safe_browsing_db/v4_get_hash_protocol_manager.h (right): https://codereview.chromium.org/2458743003/diff/20001/components/safe_browsin... components/safe_browsing_db/v4_get_hash_protocol_manager.h:275: // errors if the metadata information was not parsed correctly or was On 2016/10/27 22:06:49, Nathan Parker wrote: > nit: "Logs errors to UMA if the metadata..." Done. https://codereview.chromium.org/2458743003/diff/20001/components/safe_browsin... File components/safe_browsing_db/v4_get_hash_protocol_manager_unittest.cc (right): https://codereview.chromium.org/2458743003/diff/20001/components/safe_browsin... components/safe_browsing_db/v4_get_hash_protocol_manager_unittest.cc:476: ASSERT_EQ(1ul, full_hash_infos.size()); On 2016/10/27 22:06:49, Nathan Parker wrote: > nit: Add a comment: The PHA threat still remains since it's valid. > (same below) Done.
The CQ bit was unchecked by commit-bot@chromium.org
Dry run: This issue passed the CQ dry run.
Description was changed from ========== Failure to parse full hash metadata shouldn't discard the response BUG=660133 ========== to ========== Failure to parse full hash metadata shouldn't discard the response. TBR since kcarattini is OOO. BUG=660133 TBR=kcarattini ==========
The CQ bit was checked by vakh@chromium.org
The patchset sent to the CQ was uploaded after l-g-t-m from nparker@chromium.org Link to the patchset: https://codereview.chromium.org/2458743003/#ps40001 (title: "Nits: Updated comments from nparker@'s review")
CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/v2/patch-status/codereview.chromium.or...
Message was sent while issue was closed.
Description was changed from ========== Failure to parse full hash metadata shouldn't discard the response. TBR since kcarattini is OOO. BUG=660133 TBR=kcarattini ========== to ========== Failure to parse full hash metadata shouldn't discard the response. TBR since kcarattini is OOO. BUG=660133 TBR=kcarattini ==========
Message was sent while issue was closed.
Committed patchset #3 (id:40001)
Message was sent while issue was closed.
Description was changed from ========== Failure to parse full hash metadata shouldn't discard the response. TBR since kcarattini is OOO. BUG=660133 TBR=kcarattini ========== to ========== Failure to parse full hash metadata shouldn't discard the response. TBR since kcarattini is OOO. BUG=660133 TBR=kcarattini Committed: https://crrev.com/4588549b86714ddb6b770a7ef420043c49b6af4e Cr-Commit-Position: refs/heads/master@{#428218} ==========
Message was sent while issue was closed.
Patchset 3 (id:??) landed as https://crrev.com/4588549b86714ddb6b770a7ef420043c49b6af4e Cr-Commit-Position: refs/heads/master@{#428218}
Message was sent while issue was closed.
lgtm |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
