Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add account CCPA enabled and per-request-type enabled flags #1566

Merged
merged 7 commits into from
Nov 18, 2020

Conversation

bsardo
Copy link
Collaborator

@bsardo bsardo commented Nov 5, 2020

Similar to what we are doing for GDPR, as described in issue #1323 and PR #1564, this adds account-level CCPA configuration.

The order of precedence for determining whether CCPA is enabled is the same as for GDPR:

  1. Use account-level request type setting if specified
  2. Use account-level general setting if specified
  3. Use host-level general setting

@bsardo bsardo marked this pull request as draft November 5, 2020 05:53
@bsardo
Copy link
Collaborator Author

bsardo commented Nov 13, 2020

Manually verified for web, app and amp

@bsardo bsardo marked this pull request as ready for review November 13, 2020 19:20
hhhjort
hhhjort previously approved these changes Nov 16, 2020
Copy link
Collaborator

@hhhjort hhhjort left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

}

// AccountCCPAIntegration indicates whether CCPA is enabled for each request type
type AccountCCPAIntegration struct {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Eh. I think AccountCCPA makes sense, but I wouldn't mind having just one unified AccountIntegration, or some such. The only downside is it becomes harder to add a CCPA or GDPR specific value.. but we could always split the types then.

exchange/utils_test.go Show resolved Hide resolved
hhhjort
hhhjort previously approved these changes Nov 17, 2020
@bsardo bsardo requested a review from SyntaxNode November 17, 2020 19:27
if integrationEnabled := a.IntegrationEnabled.GetByIntegrationType(integrationType); integrationEnabled != nil {
return integrationEnabled
}
if a.Enabled != nil {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nitpick: You can just return a.Enabled here. Does't matter if it's nil or not. Comment is great and accurate.


if integrationEnabled != nil {
if integrationEnabled := a.IntegrationEnabled.GetByIntegrationType(integrationType); integrationEnabled != nil {
return integrationEnabled
}
if a.Enabled != nil {
Copy link
Contributor

@SyntaxNode SyntaxNode Nov 18, 2020

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same nitpick here. Sorry. Seems I missed this the first time around.

@hhhjort hhhjort merged commit 1c31e06 into prebid:master Nov 18, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants