Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[ads] General code health #27587

Closed
wants to merge 1 commit into from
Closed

[ads] General code health #27587

wants to merge 1 commit into from

Conversation

tmancey
Copy link
Collaborator

@tmancey tmancey commented Feb 8, 2025

Resolves brave/brave-browser#43838

Submitter Checklist:

  • I confirm that no security/privacy review is needed and no other type of reviews are needed, or that I have requested them
  • There is a ticket for my issue
  • Used Github auto-closing keywords in the PR description above
  • Wrote a good PR/commit description
  • Squashed any review feedback or "fixup" commits before merge, so that history is a record of what happened in the repo, not your PR
  • Added appropriate labels (QA/Yes or QA/No; release-notes/include or release-notes/exclude; OS/...) to the associated issue
  • Checked the PR locally:
    • npm run test -- brave_browser_tests, npm run test -- brave_unit_tests wiki
    • npm run presubmit wiki, npm run gn_check, npm run tslint
  • Ran git rebase master (if needed)

Reviewer Checklist:

  • A security review is not needed, or a link to one is included in the PR description
  • New files have MPL-2.0 license header
  • Adequate test coverage exists to prevent regressions
  • Major classes, functions and non-trivial code blocks are well-commented
  • Changes in component dependencies are properly reflected in gn
  • Code follows the style guide
  • Test plan is specified in PR before merging

After-merge Checklist:

Test Plan:

@tmancey tmancey self-assigned this Feb 8, 2025
@tmancey tmancey requested a review from a team as a code owner February 8, 2025 20:12
@tmancey tmancey requested review from aseren and removed request for aseren February 8, 2025 20:13
@tmancey tmancey marked this pull request as draft February 8, 2025 20:14
@tmancey tmancey force-pushed the issues/43838 branch 3 times, most recently from 8c7ccfc to 963d499 Compare February 11, 2025 15:53
@tmancey tmancey marked this pull request as ready for review February 11, 2025 15:54
@tmancey tmancey force-pushed the issues/43838 branch 2 times, most recently from a1ebc79 to 1f1d67f Compare February 15, 2025 12:46
Copy link
Contributor

[puLL-Merge] - brave/brave-core@27587

Here's my review of the pull request:

Description

This PR makes changes to ensure type consistency and improve safety by replacing int with size_t for various array indices, counters and size parameters throughout the Brave Core codebase. It also includes some challenge bypass ristretto token constant updates and test improvements.

Changes

Changes

By filename:

  1. Various *_feature.h files:
  • Changed feature parameters from int to size_t for maximum counts and caps
  • Affects ad limits, token counts, histograms, etc.
  1. challenge_bypass_ristretto files:
  • Updated test token values and constants
  • Added test helper functions for token generation
  • Improved test coverage
  1. Various *_util files:
  • Updated function signatures to use size_t instead of int for counts
  • Fixed array iterate loops to use size_t
  • Made array bound checks more consistent
  1. Test files:
  • Updated test expectations to use size_t comparisons
  • Added more comprehensive token testing
  • Fixed test constants to match new token values
sequenceDiagram
    participant Code
    participant Feature
    participant Util
    participant Test
    Code->>Feature: Define size_t feature params
    Feature-->>Code: Return size_t values
    Code->>Util: Call with size_t params
    Util->>Code: Process size-safe operations
    Test->>Code: Execute with size_t values
    Code-->>Test: Return size_t results
    Test->>Test: Verify with size_t expectations
Loading

Security Hotspots

  1. Token constant changes could potentially impact token verification if not properly coordinated across all components. The PR appears to handle this by updating all related constants consistently.

  2. Size type changes around array indices and bounds checking are security sensitive areas. The changes appear to properly maintain or improve safety by using size_t throughout.

The changes look well-tested and improve type safety overall. The token updates appear comprehensive and maintain security invariants.

Copy link
Contributor

Chromium major version is behind target branch (133.0.6943.98 vs 134.0.6998.15). Please rebase.

@github-actions github-actions bot added the chromium-version-mismatch The Chromium version on the PR branch does not match the version on the target branch label Feb 18, 2025
@github-actions github-actions bot removed the chromium-version-mismatch The Chromium version on the PR branch does not match the version on the target branch label Feb 18, 2025
@tmancey
Copy link
Collaborator Author

tmancey commented Feb 18, 2025

Closing as won't fix

@tmancey tmancey closed this Feb 18, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[ads] General code health
3 participants