diff --git a/development/build/scripts.js b/development/build/scripts.js index 8e2a3864e..77c844d7e 100644 --- a/development/build/scripts.js +++ b/development/build/scripts.js @@ -137,8 +137,8 @@ function getSegmentWriteKey({ buildType, environment }) { /** * Get the URL for the phishing warning page, if it has been set. * - * @param options0 - * @param options0.testing + * @param {object} options - The phishing warning page options. + * @param {boolean} options.testing - Whether this is a test build or not. * @returns {string} The URL for the phishing warning page, or `undefined` if no URL is set. */ function getPhishingWarningPageUrl({ testing }) { diff --git a/package.json b/package.json index 1495c7c6a..cf4875cc6 100644 --- a/package.json +++ b/package.json @@ -252,7 +252,7 @@ "@metamask/eslint-config-nodejs": "^9.0.0", "@metamask/eslint-config-typescript": "^9.0.1", "@metamask/forwarder": "^1.1.0", - "@metamask/phishing-warning": "^1.0.0", + "@metamask/phishing-warning": "^1.1.0", "@metamask/test-dapp": "^5.0.0", "@sentry/cli": "^1.58.0", "@storybook/addon-a11y": "^6.3.12", diff --git a/test/e2e/mock-page-with-disallowed-iframe/index.html b/test/e2e/mock-page-with-disallowed-iframe/index.html index c6309677e..ffadeeefa 100644 --- a/test/e2e/mock-page-with-disallowed-iframe/index.html +++ b/test/e2e/mock-page-with-disallowed-iframe/index.html @@ -7,7 +7,8 @@ function setIframeSource() { const urlSearchParams = new URLSearchParams(window.location.search); const params = Object.fromEntries(urlSearchParams.entries()); - document.getElementById('frame').src = params.extensionUrl; + const extensionUrl = new URL(params.extensionUrl); + document.getElementById('frame').src = `http://localhost:9999/#hostname=${encodeURIComponent(extensionUrl.hostname)}&href=${encodeURIComponent(extensionUrl.href)}`; } window.onload = setIframeSource; @@ -16,4 +17,4 @@