-
Notifications
You must be signed in to change notification settings - Fork 78
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Developer Friendly Privacy Preferences #4221
Developer Friendly Privacy Preferences #4221
Conversation
@eastandwestwind @allisonking just tagging you for an early look so we're on the same page about saving privacy preferences to the backend. Want to get your thoughts on the strategy. So a tricky part, I'm also comparing the experience itself to the TC string to settle this point: Just because a value is a 0 in the TC string, doesn't mean the user explicitly opted out, it might not have been presented as an option for them to opt in or out of in the first place, because that purpose is not in the data map at all. So I loop through the elements from the datamap first and then see if it's True in the string, otherwise it's saved as False. |
Passing run #4491 ↗︎Details:
Review all test suite changes for PR #4221 ↗︎ |
Codecov ReportAttention:
Additional details and impacted files@@ Coverage Diff @@
## fidesplus_1128_legal_basis_dimension #4221 +/- ##
========================================================================
+ Coverage 87.69% 87.72% +0.02%
========================================================================
Files 331 331
Lines 20777 20869 +92
Branches 2698 2708 +10
========================================================================
+ Hits 18221 18307 +86
- Misses 2091 2095 +4
- Partials 465 467 +2
☔ View full report in Codecov by Sentry. |
…15_dev_friendly_privacy_preferences # Conflicts: # src/fides/api/schemas/privacy_preference.py # tests/ops/api/v1/endpoints/test_privacy_preference_endpoints.py
…15_dev_friendly_privacy_preferences
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@pattisdr this looks great! just some very minor comments but this was impressively easy to follow given the complexity. thanks for the helpful self-review comments as always 👍
maybe hold off on merging into the base branch so that change can be fully reviewed independently? if that's a pain, then ignore me.
Closes https://github.com/ethyca/fidesplus/issues/1115
❗ Dependent on Legal Basis Dimension refactor #4201
Description Of Changes
Adds the ability to take in a TC string and save privacy preferences on the backend
Code Changes
Steps to Confirm
tcf_enabled = true
in your fides.toml and runnox -s dev -- shell
This is a random string generated by IAB TCF Encoder - it doesn't actually overlap any of my datamap, so nothing is actually saved
Response - notice how the preferences arrays are empty lists. We still decode the string here -
Response:
Pre-Merge Checklist
CHANGELOG.md