Skip to content

fix(clerk-js): Always prefer oauth popup flow in an iframe #6455

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 4 commits into from
Aug 1, 2025

Conversation

brkalow
Copy link
Member

@brkalow brkalow commented Aug 1, 2025

Description

When clerk-js is embedded in an iframe, oauth flows must use the popup strategy to avoid restrictions from an IdP's security policy preventing embedding. This should be a safe change if we assume that IdP's prevent embedding themselves.

fixes USER-2542

Checklist

  • pnpm test runs as expected.
  • pnpm build runs as expected.
  • (If applicable) JSDoc comments have been added or updated for any package exports
  • (If applicable) Documentation has been updated

Type of change

  • 🐛 Bug fix
  • 🌟 New feature
  • 🔨 Breaking change
  • 📖 Refactoring / dependency upgrade / documentation
  • other:

Summary by CodeRabbit

  • Bug Fixes
    • Improved detection of iframe environments to ensure accurate identification, even in cross-origin scenarios.
    • Adjusted authentication flow to prioritize the OAuth popup method when running inside an iframe, enhancing login reliability in embedded contexts.

Copy link

changeset-bot bot commented Aug 1, 2025

🦋 Changeset detected

Latest commit: dc54689

The changes in this PR will be included in the next version bump.

This PR includes changesets to release 3 packages
Name Type
@clerk/clerk-js Patch
@clerk/chrome-extension Patch
@clerk/clerk-expo Patch

Not sure what this means? Click here to learn what changesets are.

Click here if you're a maintainer who wants to add another changeset to this PR

Copy link

vercel bot commented Aug 1, 2025

The latest updates on your projects. Learn more about Vercel for Git ↗︎

Name Status Preview Comments Updated (UTC)
clerk-js-sandbox ✅ Ready (Inspect) Visit Preview 💬 Add feedback Aug 1, 2025 4:03pm

Copy link

pkg-pr-new bot commented Aug 1, 2025

Open in StackBlitz

@clerk/agent-toolkit

npm i https://pkg.pr.new/@clerk/agent-toolkit@6455

@clerk/astro

npm i https://pkg.pr.new/@clerk/astro@6455

@clerk/backend

npm i https://pkg.pr.new/@clerk/backend@6455

@clerk/chrome-extension

npm i https://pkg.pr.new/@clerk/chrome-extension@6455

@clerk/clerk-js

npm i https://pkg.pr.new/@clerk/clerk-js@6455

@clerk/dev-cli

npm i https://pkg.pr.new/@clerk/dev-cli@6455

@clerk/elements

npm i https://pkg.pr.new/@clerk/elements@6455

@clerk/clerk-expo

npm i https://pkg.pr.new/@clerk/clerk-expo@6455

@clerk/expo-passkeys

npm i https://pkg.pr.new/@clerk/expo-passkeys@6455

@clerk/express

npm i https://pkg.pr.new/@clerk/express@6455

@clerk/fastify

npm i https://pkg.pr.new/@clerk/fastify@6455

@clerk/localizations

npm i https://pkg.pr.new/@clerk/localizations@6455

@clerk/nextjs

npm i https://pkg.pr.new/@clerk/nextjs@6455

@clerk/nuxt

npm i https://pkg.pr.new/@clerk/nuxt@6455

@clerk/clerk-react

npm i https://pkg.pr.new/@clerk/clerk-react@6455

@clerk/react-router

npm i https://pkg.pr.new/@clerk/react-router@6455

@clerk/remix

npm i https://pkg.pr.new/@clerk/remix@6455

@clerk/shared

npm i https://pkg.pr.new/@clerk/shared@6455

@clerk/tanstack-react-start

npm i https://pkg.pr.new/@clerk/tanstack-react-start@6455

@clerk/testing

npm i https://pkg.pr.new/@clerk/testing@6455

@clerk/themes

npm i https://pkg.pr.new/@clerk/themes@6455

@clerk/types

npm i https://pkg.pr.new/@clerk/types@6455

@clerk/upgrade

npm i https://pkg.pr.new/@clerk/upgrade@6455

@clerk/vue

npm i https://pkg.pr.new/@clerk/vue@6455

commit: dc54689

Copy link
Contributor

coderabbitai bot commented Aug 1, 2025

📝 Walkthrough

Walkthrough

This change updates the authentication flow logic in the '@clerk/clerk-js' package to ensure that when the application is running inside an iframe, the OAuth popup method is preferred over the redirect flow. The detection of iframe contexts is improved by enhancing the inIframe utility function to handle cross-origin scenarios robustly by catching exceptions when accessing window.top. The originPrefersPopup function is modified to return true if the context is within an iframe, regardless of origin. Additionally, a new test suite is added to verify the behavior of originPrefersPopup under various iframe and origin scenarios.

Estimated code review effort

🎯 3 (Moderate) | ⏱️ ~15 minutes

Assessment against linked issues

Objective Addressed Explanation
Ensure Account Portal uses popup flow instead of redirect flow in iframe (USER-2542)

Assessment against linked issues: Out-of-scope changes

No out-of-scope changes found.

Note

⚡️ Unit Test Generation is now available in beta!

Learn more here, or try it out under "Finishing Touches" below.


🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Explain this complex logic.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai explain this code block.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and explain its main purpose.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Support

Need help? Create a ticket on our support page for assistance with any issues or questions.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai generate sequence diagram to generate a sequence diagram of the changes in this PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Nitpick comments (1)
.changeset/slow-loops-mix.md (1)

5-5: Fix spelling error in changeset description.

There's a typo in "detetction" which should be "detection".

-Fix iframe detetction and ensure we prefer the oauth popup flow when in an iframe.
+Fix iframe detection and ensure we prefer the oauth popup flow when in an iframe.
📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 4602f18 and 7df0101.

📒 Files selected for processing (3)
  • .changeset/slow-loops-mix.md (1 hunks)
  • packages/clerk-js/src/ui/utils/originPrefersPopup.ts (2 hunks)
  • packages/clerk-js/src/utils/runtime.ts (1 hunks)
🧰 Additional context used
📓 Path-based instructions (9)
.changeset/**

📄 CodeRabbit Inference Engine (.cursor/rules/monorepo.mdc)

Automated releases must use Changesets.

Files:

  • .changeset/slow-loops-mix.md
**/*.{js,jsx,ts,tsx}

📄 CodeRabbit Inference Engine (.cursor/rules/development.mdc)

**/*.{js,jsx,ts,tsx}: All code must pass ESLint checks with the project's configuration
Follow established naming conventions (PascalCase for components, camelCase for variables)
Maintain comprehensive JSDoc comments for public APIs
Use dynamic imports for optional features
All public APIs must be documented with JSDoc
Provide meaningful error messages to developers
Include error recovery suggestions where applicable
Log errors appropriately for debugging
Lazy load components and features when possible
Implement proper caching strategies
Use efficient data structures and algorithms
Profile and optimize critical paths
Validate all inputs and sanitize outputs
Implement proper logging with different levels

Files:

  • packages/clerk-js/src/utils/runtime.ts
  • packages/clerk-js/src/ui/utils/originPrefersPopup.ts
**/*.{js,jsx,ts,tsx,json,css,scss,md,yaml,yml}

📄 CodeRabbit Inference Engine (.cursor/rules/development.mdc)

Use Prettier for consistent code formatting

Files:

  • packages/clerk-js/src/utils/runtime.ts
  • packages/clerk-js/src/ui/utils/originPrefersPopup.ts
packages/**/*.{ts,tsx}

📄 CodeRabbit Inference Engine (.cursor/rules/development.mdc)

TypeScript is required for all packages

Files:

  • packages/clerk-js/src/utils/runtime.ts
  • packages/clerk-js/src/ui/utils/originPrefersPopup.ts
packages/**/*.{ts,tsx,d.ts}

📄 CodeRabbit Inference Engine (.cursor/rules/development.mdc)

Packages should export TypeScript types alongside runtime code

Files:

  • packages/clerk-js/src/utils/runtime.ts
  • packages/clerk-js/src/ui/utils/originPrefersPopup.ts
**/*.{ts,tsx}

📄 CodeRabbit Inference Engine (.cursor/rules/development.mdc)

Use proper TypeScript error types

**/*.{ts,tsx}: Always define explicit return types for functions, especially public APIs
Use proper type annotations for variables and parameters where inference isn't clear
Avoid any type - prefer unknown when type is uncertain, then narrow with type guards
Use interface for object shapes that might be extended
Use type for unions, primitives, and computed types
Prefer readonly properties for immutable data structures
Use private for internal implementation details
Use protected for inheritance hierarchies
Use public explicitly for clarity in public APIs
Prefer readonly for properties that shouldn't change after construction
Prefer composition and interfaces over deep inheritance chains
Use mixins for shared behavior across unrelated classes
Implement dependency injection for loose coupling
Let TypeScript infer when types are obvious
Use const assertions for literal types: as const
Use satisfies operator for type checking without widening
Use mapped types for transforming object types
Use conditional types for type-level logic
Leverage template literal types for string manipulation
Use ES6 imports/exports consistently
Use default exports sparingly, prefer named exports
Use type-only imports: import type { ... } from ...
No any types without justification
Proper error handling with typed errors
Consistent use of readonly for immutable data
Proper generic constraints
No unused type parameters
Proper use of utility types instead of manual type construction
Type-only imports where possible
Proper tree-shaking friendly exports
No circular dependencies
Efficient type computations (avoid deep recursion)

Files:

  • packages/clerk-js/src/utils/runtime.ts
  • packages/clerk-js/src/ui/utils/originPrefersPopup.ts
**/*.{js,ts,tsx,jsx}

📄 CodeRabbit Inference Engine (.cursor/rules/monorepo.mdc)

Support multiple Clerk environment variables (CLERK_, NEXT_PUBLIC_CLERK_, etc.) for configuration.

Files:

  • packages/clerk-js/src/utils/runtime.ts
  • packages/clerk-js/src/ui/utils/originPrefersPopup.ts
**/*

⚙️ CodeRabbit Configuration File

**/*: If there are no tests added or modified as part of the PR, please suggest that tests be added to cover the changes.

Whenever reviewing a pull request, if there are any changes that could impact security, always tag @clerk/security in the PR.

Security-impacting changes include, but are not limited to:

  • Changes to authentication logic or mechanisms (e.g. login, session handling, token issuance)
  • Any modification to access control, authorization checks, or role-based permissions
  • Introduction or modification of hashing algorithms, signature verification, or cryptographic primitives
  • Handling of sensitive data (e.g. passwords, tokens, secrets, PII)
  • Integration with external identity providers (e.g. SSO, OAuth, OpenID Connect)
  • Modifications to security headers, cookie flags, CORS policies, or CSRF protections
  • Bypass mechanisms (e.g. feature flags, testing overrides) that could weaken protections
  • Changes to rate limiting, abuse prevention, or input validation

If you're unsure whether a change is security-relevant, err on the side of caution and tag @clerk/security.

Any time that you tag @clerk/security, please do so explicitly in a code comment, rather than within a collapsed section in a coderabbit comment, such as the "recent review details" section. If you do use the team name in any thinking or non-direct-code-comment content, it can be referred to as "clerk security team" to avoid accidentally printing the tag which sends a notification to the team.

Files:

  • packages/clerk-js/src/utils/runtime.ts
  • packages/clerk-js/src/ui/utils/originPrefersPopup.ts
packages/clerk-js/src/ui/**/*.{ts,tsx}

📄 CodeRabbit Inference Engine (.cursor/rules/clerk-js-ui.mdc)

packages/clerk-js/src/ui/**/*.{ts,tsx}: Element descriptors should always be camelCase
Use element descriptors in UI components to enable consistent theming and styling via appearance.elements
Element descriptors should generate unique, stable CSS classes for theming
Element descriptors should handle state classes (e.g., cl-loading, cl-active, cl-error, cl-open) automatically based on component state
Do not render hard-coded values; all user-facing strings must be localized using provided localization methods
Use the useLocalizations hook and localizationKeys utility for all text and error messages
Use the styled system (sx prop, theme tokens, responsive values) for custom component styling
Use useCardState for card-level state, useFormState for form-level state, and useLoadingStatus for loading states
Always use handleError utility for API errors and use translateError for localized error messages
Use useFormControl for form field state, implement proper validation, and handle loading and error states in forms
Use localization keys for all form labels and placeholders
Use element descriptors for consistent styling and follow the theme token system
Use the Card and FormContainer patterns for consistent UI structure

Files:

  • packages/clerk-js/src/ui/utils/originPrefersPopup.ts
🧬 Code Graph Analysis (1)
packages/clerk-js/src/ui/utils/originPrefersPopup.ts (1)
packages/clerk-js/src/utils/runtime.ts (1)
  • inIframe (13-23)
🪛 LanguageTool
.changeset/slow-loops-mix.md

[grammar] ~5-~5: Ensure spelling is correct
Context: ...@clerk/clerk-js': patch --- Fix iframe detetction and ensure we prefer the oauth popup fl...

(QB_NEW_EN_ORTHOGRAPHY_ERROR_IDS_1)

🔇 Additional comments (3)
packages/clerk-js/src/utils/runtime.ts (1)

14-22: Excellent cross-origin iframe detection implementation.

The enhanced logic correctly handles both same-origin and cross-origin iframe scenarios. The try-catch approach is the standard way to detect cross-origin iframes since accessing window.top throws a security exception in cross-origin contexts.

This change affects authentication flow logic and should be reviewed by the security team: @clerk/security

packages/clerk-js/src/ui/utils/originPrefersPopup.ts (2)

1-1: Clean import addition.

The import statement follows the established pattern using the '@/utils' alias.


17-17: Correct implementation of iframe popup preference.

The logic change properly implements the requirement to prefer popup flow when in an iframe. Using OR logic ensures popup is chosen in either scenario (iframe context OR predefined origins), which is the safer approach for avoiding CSP violations and IdP embedding restrictions.

This authentication flow change should be reviewed by the security team: @clerk/security

Copy link
Contributor

coderabbitai bot commented Aug 1, 2025

📝 Walkthrough

Walkthrough

The changes update the iframe detection logic and authentication flow preference in the @clerk/clerk-js package. The inIframe utility function is enhanced to handle cross-origin access errors, ensuring accurate detection of iframe contexts. The originPrefersPopup function is modified to return true if the code is running inside an iframe, thereby prioritizing the OAuth popup authentication flow in such scenarios. No changes were made to exported function signatures or public APIs.

Estimated code review effort

🎯 2 (Simple) | ⏱️ ~8 minutes

Assessment against linked issues

Objective Addressed Explanation
Use popup authentication flow when the Account Portal is in an iframe (USER-2542)

Assessment against linked issues: Out-of-scope changes

No out-of-scope changes were found.

Note

⚡️ Unit Test Generation is now available in beta!

Learn more here, or try it out under "Finishing Touches" below.


🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Explain this complex logic.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai explain this code block.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and explain its main purpose.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Support

Need help? Create a ticket on our support page for assistance with any issues or questions.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai generate sequence diagram to generate a sequence diagram of the changes in this PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🧹 Nitpick comments (1)
.changeset/slow-loops-mix.md (1)

5-5: Fix spelling error in changeset description.

There's a typo in "detetction" - it should be "detection".

-Fix iframe detetction and ensure we prefer the oauth popup flow when in an iframe.
+Fix iframe detection and ensure we prefer the oauth popup flow when in an iframe.
📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 4602f18 and 7df0101.

📒 Files selected for processing (3)
  • .changeset/slow-loops-mix.md (1 hunks)
  • packages/clerk-js/src/ui/utils/originPrefersPopup.ts (2 hunks)
  • packages/clerk-js/src/utils/runtime.ts (1 hunks)
🧰 Additional context used
📓 Path-based instructions (9)
.changeset/**

📄 CodeRabbit Inference Engine (.cursor/rules/monorepo.mdc)

Automated releases must use Changesets.

Files:

  • .changeset/slow-loops-mix.md
**/*.{js,jsx,ts,tsx}

📄 CodeRabbit Inference Engine (.cursor/rules/development.mdc)

**/*.{js,jsx,ts,tsx}: All code must pass ESLint checks with the project's configuration
Follow established naming conventions (PascalCase for components, camelCase for variables)
Maintain comprehensive JSDoc comments for public APIs
Use dynamic imports for optional features
All public APIs must be documented with JSDoc
Provide meaningful error messages to developers
Include error recovery suggestions where applicable
Log errors appropriately for debugging
Lazy load components and features when possible
Implement proper caching strategies
Use efficient data structures and algorithms
Profile and optimize critical paths
Validate all inputs and sanitize outputs
Implement proper logging with different levels

Files:

  • packages/clerk-js/src/utils/runtime.ts
  • packages/clerk-js/src/ui/utils/originPrefersPopup.ts
**/*.{js,jsx,ts,tsx,json,css,scss,md,yaml,yml}

📄 CodeRabbit Inference Engine (.cursor/rules/development.mdc)

Use Prettier for consistent code formatting

Files:

  • packages/clerk-js/src/utils/runtime.ts
  • packages/clerk-js/src/ui/utils/originPrefersPopup.ts
packages/**/*.{ts,tsx}

📄 CodeRabbit Inference Engine (.cursor/rules/development.mdc)

TypeScript is required for all packages

Files:

  • packages/clerk-js/src/utils/runtime.ts
  • packages/clerk-js/src/ui/utils/originPrefersPopup.ts
packages/**/*.{ts,tsx,d.ts}

📄 CodeRabbit Inference Engine (.cursor/rules/development.mdc)

Packages should export TypeScript types alongside runtime code

Files:

  • packages/clerk-js/src/utils/runtime.ts
  • packages/clerk-js/src/ui/utils/originPrefersPopup.ts
**/*.{ts,tsx}

📄 CodeRabbit Inference Engine (.cursor/rules/development.mdc)

Use proper TypeScript error types

**/*.{ts,tsx}: Always define explicit return types for functions, especially public APIs
Use proper type annotations for variables and parameters where inference isn't clear
Avoid any type - prefer unknown when type is uncertain, then narrow with type guards
Use interface for object shapes that might be extended
Use type for unions, primitives, and computed types
Prefer readonly properties for immutable data structures
Use private for internal implementation details
Use protected for inheritance hierarchies
Use public explicitly for clarity in public APIs
Prefer readonly for properties that shouldn't change after construction
Prefer composition and interfaces over deep inheritance chains
Use mixins for shared behavior across unrelated classes
Implement dependency injection for loose coupling
Let TypeScript infer when types are obvious
Use const assertions for literal types: as const
Use satisfies operator for type checking without widening
Use mapped types for transforming object types
Use conditional types for type-level logic
Leverage template literal types for string manipulation
Use ES6 imports/exports consistently
Use default exports sparingly, prefer named exports
Use type-only imports: import type { ... } from ...
No any types without justification
Proper error handling with typed errors
Consistent use of readonly for immutable data
Proper generic constraints
No unused type parameters
Proper use of utility types instead of manual type construction
Type-only imports where possible
Proper tree-shaking friendly exports
No circular dependencies
Efficient type computations (avoid deep recursion)

Files:

  • packages/clerk-js/src/utils/runtime.ts
  • packages/clerk-js/src/ui/utils/originPrefersPopup.ts
**/*.{js,ts,tsx,jsx}

📄 CodeRabbit Inference Engine (.cursor/rules/monorepo.mdc)

Support multiple Clerk environment variables (CLERK_, NEXT_PUBLIC_CLERK_, etc.) for configuration.

Files:

  • packages/clerk-js/src/utils/runtime.ts
  • packages/clerk-js/src/ui/utils/originPrefersPopup.ts
**/*

⚙️ CodeRabbit Configuration File

**/*: If there are no tests added or modified as part of the PR, please suggest that tests be added to cover the changes.

Whenever reviewing a pull request, if there are any changes that could impact security, always tag @clerk/security in the PR.

Security-impacting changes include, but are not limited to:

  • Changes to authentication logic or mechanisms (e.g. login, session handling, token issuance)
  • Any modification to access control, authorization checks, or role-based permissions
  • Introduction or modification of hashing algorithms, signature verification, or cryptographic primitives
  • Handling of sensitive data (e.g. passwords, tokens, secrets, PII)
  • Integration with external identity providers (e.g. SSO, OAuth, OpenID Connect)
  • Modifications to security headers, cookie flags, CORS policies, or CSRF protections
  • Bypass mechanisms (e.g. feature flags, testing overrides) that could weaken protections
  • Changes to rate limiting, abuse prevention, or input validation

If you're unsure whether a change is security-relevant, err on the side of caution and tag @clerk/security.

Any time that you tag @clerk/security, please do so explicitly in a code comment, rather than within a collapsed section in a coderabbit comment, such as the "recent review details" section. If you do use the team name in any thinking or non-direct-code-comment content, it can be referred to as "clerk security team" to avoid accidentally printing the tag which sends a notification to the team.

Files:

  • packages/clerk-js/src/utils/runtime.ts
  • packages/clerk-js/src/ui/utils/originPrefersPopup.ts
packages/clerk-js/src/ui/**/*.{ts,tsx}

📄 CodeRabbit Inference Engine (.cursor/rules/clerk-js-ui.mdc)

packages/clerk-js/src/ui/**/*.{ts,tsx}: Element descriptors should always be camelCase
Use element descriptors in UI components to enable consistent theming and styling via appearance.elements
Element descriptors should generate unique, stable CSS classes for theming
Element descriptors should handle state classes (e.g., cl-loading, cl-active, cl-error, cl-open) automatically based on component state
Do not render hard-coded values; all user-facing strings must be localized using provided localization methods
Use the useLocalizations hook and localizationKeys utility for all text and error messages
Use the styled system (sx prop, theme tokens, responsive values) for custom component styling
Use useCardState for card-level state, useFormState for form-level state, and useLoadingStatus for loading states
Always use handleError utility for API errors and use translateError for localized error messages
Use useFormControl for form field state, implement proper validation, and handle loading and error states in forms
Use localization keys for all form labels and placeholders
Use element descriptors for consistent styling and follow the theme token system
Use the Card and FormContainer patterns for consistent UI structure

Files:

  • packages/clerk-js/src/ui/utils/originPrefersPopup.ts
🧬 Code Graph Analysis (1)
packages/clerk-js/src/ui/utils/originPrefersPopup.ts (1)
packages/clerk-js/src/utils/runtime.ts (1)
  • inIframe (13-23)
🪛 LanguageTool
.changeset/slow-loops-mix.md

[grammar] ~5-~5: Ensure spelling is correct
Context: ...@clerk/clerk-js': patch --- Fix iframe detetction and ensure we prefer the oauth popup fl...

(QB_NEW_EN_ORTHOGRAPHY_ERROR_IDS_1)

🔇 Additional comments (2)
packages/clerk-js/src/utils/runtime.ts (1)

13-23: inIframe detection verified and correct

  • Scanned the repository: inIframe() is defined in packages/clerk-js/src/utils/runtime.ts and only referenced by
    inCrossOriginIframe() / inSecureCrossOriginIframe() (same file)
    originPrefersPopup() (packages/clerk-js/src/ui/utils/originPrefersPopup.ts)
    • Cookie attribute logic (packages/clerk-js/src/core/auth/cookies/*.ts)
  • All callsites correctly rely on the updated try/catch + window.self !== window.top approach for same- and cross-origin iframes. No code changes required.

Please ensure comprehensive test coverage for authentication flows in both same-origin and cross-origin iframe contexts.

packages/clerk-js/src/ui/utils/originPrefersPopup.ts (1)

1-2: Import addition looks good.

The import of inIframe utility is correctly added to support the enhanced iframe detection logic.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Nitpick comments (1)
packages/clerk-js/src/ui/utils/__tests__/originPrefersPopup.spec.ts (1)

1-230: Consider adding tests for security implications.

Since this change affects OAuth flow selection and has security implications (preventing CSP violations), consider adding a test comment or documentation that explicitly mentions the security rationale. The current tests are comprehensive but could benefit from a comment explaining why iframe detection takes precedence.

Given that this change impacts authentication logic, please tag @clerk/security for review.

Consider adding a comment like this to the integration scenarios:

  describe('integration scenarios', () => {
+    // These tests verify the security-driven behavior where iframe detection
+    // takes precedence to prevent CSP violations from IdP restrictions
    it('should prioritize iframe detection over origin matching', () => {
📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 7df0101 and dc54689.

📒 Files selected for processing (1)
  • packages/clerk-js/src/ui/utils/__tests__/originPrefersPopup.spec.ts (1 hunks)
🧰 Additional context used
📓 Path-based instructions (11)
packages/clerk-js/src/ui/**/*.{ts,tsx}

📄 CodeRabbit Inference Engine (.cursor/rules/clerk-js-ui.mdc)

packages/clerk-js/src/ui/**/*.{ts,tsx}: Element descriptors should always be camelCase
Use element descriptors in UI components to enable consistent theming and styling via appearance.elements
Element descriptors should generate unique, stable CSS classes for theming
Element descriptors should handle state classes (e.g., cl-loading, cl-active, cl-error, cl-open) automatically based on component state
Do not render hard-coded values; all user-facing strings must be localized using provided localization methods
Use the useLocalizations hook and localizationKeys utility for all text and error messages
Use the styled system (sx prop, theme tokens, responsive values) for custom component styling
Use useCardState for card-level state, useFormState for form-level state, and useLoadingStatus for loading states
Always use handleError utility for API errors and use translateError for localized error messages
Use useFormControl for form field state, implement proper validation, and handle loading and error states in forms
Use localization keys for all form labels and placeholders
Use element descriptors for consistent styling and follow the theme token system
Use the Card and FormContainer patterns for consistent UI structure

Files:

  • packages/clerk-js/src/ui/utils/__tests__/originPrefersPopup.spec.ts
**/*.{js,jsx,ts,tsx}

📄 CodeRabbit Inference Engine (.cursor/rules/development.mdc)

**/*.{js,jsx,ts,tsx}: All code must pass ESLint checks with the project's configuration
Follow established naming conventions (PascalCase for components, camelCase for variables)
Maintain comprehensive JSDoc comments for public APIs
Use dynamic imports for optional features
All public APIs must be documented with JSDoc
Provide meaningful error messages to developers
Include error recovery suggestions where applicable
Log errors appropriately for debugging
Lazy load components and features when possible
Implement proper caching strategies
Use efficient data structures and algorithms
Profile and optimize critical paths
Validate all inputs and sanitize outputs
Implement proper logging with different levels

Files:

  • packages/clerk-js/src/ui/utils/__tests__/originPrefersPopup.spec.ts
**/*.{js,jsx,ts,tsx,json,css,scss,md,yaml,yml}

📄 CodeRabbit Inference Engine (.cursor/rules/development.mdc)

Use Prettier for consistent code formatting

Files:

  • packages/clerk-js/src/ui/utils/__tests__/originPrefersPopup.spec.ts
packages/**/*.{ts,tsx}

📄 CodeRabbit Inference Engine (.cursor/rules/development.mdc)

TypeScript is required for all packages

Files:

  • packages/clerk-js/src/ui/utils/__tests__/originPrefersPopup.spec.ts
packages/**/*.{ts,tsx,d.ts}

📄 CodeRabbit Inference Engine (.cursor/rules/development.mdc)

Packages should export TypeScript types alongside runtime code

Files:

  • packages/clerk-js/src/ui/utils/__tests__/originPrefersPopup.spec.ts
**/*.{ts,tsx}

📄 CodeRabbit Inference Engine (.cursor/rules/development.mdc)

Use proper TypeScript error types

**/*.{ts,tsx}: Always define explicit return types for functions, especially public APIs
Use proper type annotations for variables and parameters where inference isn't clear
Avoid any type - prefer unknown when type is uncertain, then narrow with type guards
Use interface for object shapes that might be extended
Use type for unions, primitives, and computed types
Prefer readonly properties for immutable data structures
Use private for internal implementation details
Use protected for inheritance hierarchies
Use public explicitly for clarity in public APIs
Prefer readonly for properties that shouldn't change after construction
Prefer composition and interfaces over deep inheritance chains
Use mixins for shared behavior across unrelated classes
Implement dependency injection for loose coupling
Let TypeScript infer when types are obvious
Use const assertions for literal types: as const
Use satisfies operator for type checking without widening
Use mapped types for transforming object types
Use conditional types for type-level logic
Leverage template literal types for string manipulation
Use ES6 imports/exports consistently
Use default exports sparingly, prefer named exports
Use type-only imports: import type { ... } from ...
No any types without justification
Proper error handling with typed errors
Consistent use of readonly for immutable data
Proper generic constraints
No unused type parameters
Proper use of utility types instead of manual type construction
Type-only imports where possible
Proper tree-shaking friendly exports
No circular dependencies
Efficient type computations (avoid deep recursion)

Files:

  • packages/clerk-js/src/ui/utils/__tests__/originPrefersPopup.spec.ts
packages/**/*.{test,spec}.{js,jsx,ts,tsx}

📄 CodeRabbit Inference Engine (.cursor/rules/monorepo.mdc)

Unit tests should use Jest or Vitest as the test runner.

Files:

  • packages/clerk-js/src/ui/utils/__tests__/originPrefersPopup.spec.ts
packages/{clerk-js,elements,themes}/**/*.{test,spec}.{js,jsx,ts,tsx}

📄 CodeRabbit Inference Engine (.cursor/rules/monorepo.mdc)

Visual regression testing should be performed for UI components.

Files:

  • packages/clerk-js/src/ui/utils/__tests__/originPrefersPopup.spec.ts
**/*.{js,ts,tsx,jsx}

📄 CodeRabbit Inference Engine (.cursor/rules/monorepo.mdc)

Support multiple Clerk environment variables (CLERK_, NEXT_PUBLIC_CLERK_, etc.) for configuration.

Files:

  • packages/clerk-js/src/ui/utils/__tests__/originPrefersPopup.spec.ts
**/__tests__/**/*.{ts,tsx}

📄 CodeRabbit Inference Engine (.cursor/rules/typescript.mdc)

**/__tests__/**/*.{ts,tsx}: Create type-safe test builders/factories
Use branded types for test isolation
Implement proper mock types that match interfaces

Files:

  • packages/clerk-js/src/ui/utils/__tests__/originPrefersPopup.spec.ts
**/*

⚙️ CodeRabbit Configuration File

**/*: If there are no tests added or modified as part of the PR, please suggest that tests be added to cover the changes.

Whenever reviewing a pull request, if there are any changes that could impact security, always tag @clerk/security in the PR.

Security-impacting changes include, but are not limited to:

  • Changes to authentication logic or mechanisms (e.g. login, session handling, token issuance)
  • Any modification to access control, authorization checks, or role-based permissions
  • Introduction or modification of hashing algorithms, signature verification, or cryptographic primitives
  • Handling of sensitive data (e.g. passwords, tokens, secrets, PII)
  • Integration with external identity providers (e.g. SSO, OAuth, OpenID Connect)
  • Modifications to security headers, cookie flags, CORS policies, or CSRF protections
  • Bypass mechanisms (e.g. feature flags, testing overrides) that could weaken protections
  • Changes to rate limiting, abuse prevention, or input validation

If you're unsure whether a change is security-relevant, err on the side of caution and tag @clerk/security.

Any time that you tag @clerk/security, please do so explicitly in a code comment, rather than within a collapsed section in a coderabbit comment, such as the "recent review details" section. If you do use the team name in any thinking or non-direct-code-comment content, it can be referred to as "clerk security team" to avoid accidentally printing the tag which sends a notification to the team.

Files:

  • packages/clerk-js/src/ui/utils/__tests__/originPrefersPopup.spec.ts
🧬 Code Graph Analysis (1)
packages/clerk-js/src/ui/utils/__tests__/originPrefersPopup.spec.ts (2)
packages/clerk-js/src/utils/runtime.ts (1)
  • inIframe (13-23)
packages/clerk-js/src/ui/utils/originPrefersPopup.ts (1)
  • originPrefersPopup (16-18)
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (4)
  • GitHub Check: semgrep-cloud-platform/scan
  • GitHub Check: Formatting | Dedupe | Changeset
  • GitHub Check: semgrep/ci
  • GitHub Check: Analyze (javascript-typescript)
🔇 Additional comments (7)
packages/clerk-js/src/ui/utils/__tests__/originPrefersPopup.spec.ts (7)

1-13: LGTM! Proper test setup with mocking.

The import structure and mocking setup is correct. Using Vitest's vi.mock to mock the inIframe function allows for controlled testing of different iframe scenarios. The type assertion vi.mocked(inIframe) ensures proper TypeScript support for the mock.


14-44: Excellent test infrastructure with proper cleanup.

The test setup properly:

  • Stores the original window.location for restoration
  • Provides a helper function to mock window.location.origin
  • Implements proper beforeEach/afterEach hooks for test isolation
  • Ensures no side effects between tests by restoring the original location

This follows testing best practices for DOM manipulation.


46-60: Comprehensive iframe detection testing.

These tests correctly verify the new behavior where originPrefersPopup returns true when inside an iframe, regardless of the origin. This aligns with the PR objective to prefer popup flow in iframe contexts to avoid CSP issues.


67-115: Thorough coverage of preferred origin patterns.

The tests comprehensively cover all the preferred origin patterns mentioned in the implementation:

  • .lovable.app domains
  • .lovableproject.com domains
  • .webcontainer-api.io domains
  • .vusercontent.net domains
  • .v0.dev domains

The tests also verify protocol handling (HTTP/HTTPS), which is important for completeness.


117-163: Excellent negative testing and security considerations.

These tests are particularly valuable as they:

  • Test common non-preferred origins
  • Verify that similar but non-matching domains are rejected (preventing false positives)
  • Include security-focused tests that ensure domains containing preferred origins as substrings are rejected (lines 151-162)

This helps prevent potential security issues where malicious domains might try to spoof preferred origins.


165-187: Good edge case coverage.

The edge case testing appropriately handles:

  • Empty origins
  • Case sensitivity (important for security)
  • Malformed origins

The case sensitivity test (lines 171-177) is particularly important as it prevents bypassing the origin checks through case manipulation.


190-228: Excellent integration testing with real-world scenarios.

These integration tests effectively verify:

  • The priority of iframe detection over origin matching (which is the core change)
  • Proper function call verification using toHaveBeenCalledOnce()
  • Real-world developer scenarios (CodeSandbox, StackBlitz, embedded apps)

The real-world scenarios (lines 208-227) are particularly valuable as they demonstrate practical use cases for the functionality.

@brkalow brkalow merged commit 0b165f8 into main Aug 1, 2025
36 checks passed
@brkalow brkalow deleted the brk.fix/popup-in-iframe branch August 1, 2025 17:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants