Skip to content

Commit c1df0ad

Browse files
Merge latest master
2 parents b796410 + 2121908 commit c1df0ad

File tree

70 files changed

+523
-1437
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

70 files changed

+523
-1437
lines changed

.eslintrc

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,6 @@
131131
"local/prefer-unnested-spread-objects": 2,
132132
"local/private-prop-names": 2,
133133
"local/query-selector": 2,
134-
"local/split-single-pass-comment": 2,
135134
"local/todo-format": 0,
136135
"local/unused-private-field": 2,
137136
"local/vsync": 0,

.travis.yml

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,6 @@ before_install:
2525
branches:
2626
only:
2727
- master
28-
- release
29-
- canary
30-
- nightly
3128
- /^amp-release-.*$/
3229
addons:
3330
apt:
@@ -77,10 +74,6 @@ jobs:
7774
name: 'Module Dist, Bundle Size'
7875
script:
7976
- unbuffer node build-system/pr-check/module-dist-bundle-size.js
80-
- stage: test
81-
name: 'Single Pass Tests'
82-
script:
83-
- unbuffer node build-system/pr-check/single-pass-tests.js
8477
- stage: test
8578
name: 'Visual Diff Tests'
8679
script:

3p/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,8 +58,8 @@ Review the [ads/README](../ads/README.md) for further details on ad integration.
5858
- AMP allows inclusion of fonts via the `@font-face` directive.
5959
- JavaScript can not be involved with the initiation of font loading.
6060
- Font loading gets controlled (but not initiated) by [`<amp-font>`](https://github.com/ampproject/amphtml/issues/648).
61-
- AMP by default does not allow inclusion of external stylesheets, but it is happy to allowlist URL prefixes of font providers for font inclusion via link tags. These link tags and their fonts must be served via HTTPS.
62-
- If a font provider does referrer based "security" it needs to allowlist the AMP proxy origins before being included in the link tag allowlist. AMP proxy sends the appropriate referrer header such as `https://cdn.ampproject.org`.
61+
- AMP by default does not allow inclusion of external stylesheets, but it is happy to allow URL prefixes of font providers for font inclusion via link tags. These link tags and their fonts must be served via HTTPS.
62+
- If a font provider does referrer based "security" it needs to allow the AMP proxy origins before being included in the link tag allowlist. AMP proxy sends the appropriate referrer header such as `https://cdn.ampproject.org`.
6363

6464
# Adding proper integration tests
6565

3p/ampcontext.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ export class AbstractAmpContext {
180180
/**
181181
* Requests HTML snippet from the parent window.
182182
* @param {string} selector CSS selector
183-
* @param {!Array<string>} attributes allowlisted attributes to be kept
183+
* @param {!Array<string>} attributes permissible attributes to be kept
184184
* in the returned HTML string
185185
* @param {function(*)} callback to be invoked with the HTML string
186186
*/

3p/embedly.js

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ const RESIZE_EVENT_NAME = 'card.resize';
3737
const CARD_CSS_CLASS = 'embedly-card';
3838

3939
/**
40-
* Allowlisted card options.
40+
* Allowed card options.
4141
*
4242
* - Key is in camel case as received in "data".
4343
* - The value is in the format expected by embedly.
@@ -81,7 +81,7 @@ export function embedly(global, data) {
8181
card.href = data.url;
8282
card.classList.add(CARD_CSS_CLASS);
8383

84-
// Add allowlisted data attributes and values to card
84+
// Add permissible data attributes and values to card
8585
// when these are provided by component.
8686
for (const key in CardOptions) {
8787
if (hasOwn(CardOptions, key) && typeof data[key] !== 'undefined') {

3p/integration.js

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -771,13 +771,13 @@ export function validateAllowedTypes(window, type, allowedTypes) {
771771
}
772772
userAssert(
773773
allowedTypes && allowedTypes.indexOf(type) != -1,
774-
'Non-allowlisted 3p type for custom iframe: %s',
774+
'3p type for custom iframe not allowed: %s',
775775
type
776776
);
777777
}
778778

779779
/**
780-
* Check that parent host name was allowlisted.
780+
* Check that parent host name was allowed.
781781
* @param {!Window} window
782782
* @param {!Array<string>} allowedHostnames Suffixes of allowed host names.
783783
* @visibleForTesting
@@ -799,11 +799,11 @@ export function validateAllowedEmbeddingOrigins(window, allowedHostnames) {
799799
.hostname;
800800
}
801801
for (let i = 0; i < allowedHostnames.length; i++) {
802-
// Either the hostname is exactly as allowlisted…
802+
// Either the hostname is allowed
803803
if (allowedHostnames[i] == hostname) {
804804
return;
805805
}
806-
// Or it ends in .$hostname (aka is a sub domain of the allowlisted domain.
806+
// Or it ends in .$hostname (aka is a sub domain of an allowed domain.
807807
if (endsWith(hostname, '.' + allowedHostnames[i])) {
808808
return;
809809
}

ads/_a4a-config.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ export function getA4ARegistry() {
4444
'fake': () => true,
4545
// TODO: Add new ad network implementation "is enabled" functions here.
4646
// Note: if you add a function here that requires a new "import", above,
47-
// you'll probably also need to add a allowlist exception to
47+
// you'll probably also need to add an exception to
4848
// build-system/test-configs/dep-check-config.js in the
4949
// "filesMatching: 'ads/**/*.js'" rule.
5050
});

ads/google/a4a/traffic-experiments.js

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -38,16 +38,6 @@ export let A4aExperimentBranches;
3838
/** @type {string} @private */
3939
export const MANUAL_EXPERIMENT_ID = '117152632';
4040

41-
/**
42-
* Experiment IDs used to identify single pass experiments.
43-
*
44-
* @enum {string}
45-
*/
46-
export const SINGLE_PASS_EXPERIMENT_IDS = {
47-
MULTI_PASS: '21063529',
48-
SINGLE_PASS: '21063530',
49-
};
50-
5141
/**
5242
* @param {!Window} win
5343
* @param {!Element} element Ad tag Element.

ads/google/utils.js

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,11 @@ import {user} from '../../src/log';
2626
* Approved height for AdSense full-width responsive ads.
2727
* @const {number}
2828
*/
29+
<<<<<<< HEAD
2930
export const ADSENSE_RSPV_ALLOWLISTED_HEIGHT = 320;
31+
=======
32+
export const ADSENSE_RSPV_ALLOWED_HEIGHT = 320;
33+
>>>>>>> 212190879e0a01fca5664ada96f05465a287de32
3034

3135
/**
3236
* The attribute value for AdSense data-auto-format tag.

ads/inabox/inabox-messaging-host.js

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -143,7 +143,7 @@ export class InaboxMessagingHost {
143143
? allowedTypes.split(/\s*,\s*/)
144144
: READ_ONLY_MESSAGES;
145145
if (allowedTypesList.indexOf(request['type']) === -1) {
146-
dev().info(TAG, 'Ignored non-allowlisted message type:', message);
146+
dev().info(TAG, 'Message type ignored:', message);
147147
return false;
148148
}
149149

@@ -201,10 +201,10 @@ export class InaboxMessagingHost {
201201
source./*OK*/ postMessage(
202202
serializeMessage(MessageType.POSITION, request.sentinel, data),
203203
// We don't need to restrict what origin we send the data to because (a)
204-
// we've already verified that this iframe is allowlisted and allowed to
205-
// learn its position, and (b) we're post messaging back directly to the
206-
// requesting frame. If we did restrict the origin this would not work
207-
// with implementations that use a null origin to render ads.
204+
// we've already verified that this iframe is allowed to learn its position,
205+
// and (b) we're post messaging back directly to the requesting frame.
206+
// If we did restrict the origin this would not work with implementations
207+
// that use a null origin to render ads.
208208
'*'
209209
);
210210
}

0 commit comments

Comments
 (0)