1
0
mirror of https://github.com/kremalicious/metamask-extension.git synced 2024-11-24 11:01:41 +01:00
metamask-extension/app/scripts/contentscript.js

101 lines
3.0 KiB
JavaScript
Raw Normal View History

const LocalMessageDuplexStream = require('post-message-stream')
const PongStream = require('ping-pong-stream/pong')
2015-12-19 07:05:16 +01:00
const PortStream = require('./lib/port-stream.js')
2016-05-06 01:04:43 +02:00
const ObjectMultiplex = require('./lib/obj-multiplex')
const extension = require('extensionizer')
2016-05-06 01:04:43 +02:00
const fs = require('fs')
const path = require('path')
2016-11-11 19:26:12 +01:00
const inpageText = fs.readFileSync(path.join(__dirname, 'inpage.js')).toString()
// Eventually this streaming injection could be replaced with:
// https://developer.mozilla.org/en-US/docs/Mozilla/Tech/XPCOM/Language_Bindings/Components.utils.exportFunction
//
// But for now that is only Firefox
// If we create a FireFox-only code path using that API,
// MetaMask will be much faster loading and performant on Firefox.
if (shouldInjectWeb3()) {
setupInjection()
setupStreams()
}
2016-11-11 19:26:12 +01:00
function setupInjection () {
try {
// inject in-page script
var scriptTag = document.createElement('script')
scriptTag.src = extension.extension.getURL('scripts/inpage.js')
scriptTag.textContent = inpageText
scriptTag.onload = function () { this.parentNode.removeChild(this) }
var container = document.head || document.documentElement
// append as first child
container.insertBefore(scriptTag, container.children[0])
} catch (e) {
console.error('Metamask injection failed.', e)
}
}
2016-11-11 19:26:12 +01:00
function setupStreams () {
// setup communication to page and plugin
const pageStream = new LocalMessageDuplexStream({
name: 'contentscript',
target: 'inpage',
})
2016-08-30 01:49:58 +02:00
pageStream.on('error', console.error)
const pluginPort = extension.runtime.connect({ name: 'contentscript' })
const pluginStream = new PortStream(pluginPort)
2016-08-30 01:49:58 +02:00
pluginStream.on('error', console.error)
// forward communication plugin->inpage
pageStream.pipe(pluginStream).pipe(pageStream)
// setup local multistream channels
const mx = ObjectMultiplex()
2016-08-30 01:49:58 +02:00
mx.on('error', console.error)
mx.pipe(pageStream).pipe(mx)
mx.pipe(pluginStream).pipe(mx)
// connect ping stream
const pongStream = new PongStream({ objectMode: true })
pongStream.pipe(mx.createStream('pingpong')).pipe(pongStream)
// connect phishing warning stream
const phishingStream = mx.createStream('phishing')
phishingStream.once('data', redirectToPhishingWarning)
// ignore unused channels (handled by background, inpage)
mx.ignoreStream('provider')
mx.ignoreStream('publicConfig')
}
2016-11-11 19:26:12 +01:00
function shouldInjectWeb3 () {
2017-03-28 20:30:39 +02:00
return doctypeCheck() || suffixCheck()
2016-10-16 00:33:49 +02:00
}
2017-03-28 20:30:39 +02:00
function doctypeCheck () {
2017-03-22 19:25:56 +01:00
const doctype = window.document.doctype
if (doctype) {
return doctype.name === 'html'
} else {
2017-03-28 20:30:39 +02:00
return false
2016-10-16 00:33:49 +02:00
}
}
2017-03-28 20:30:39 +02:00
2017-04-27 06:05:45 +02:00
function suffixCheck () {
2017-03-28 20:30:39 +02:00
var prohibitedTypes = ['xml', 'pdf']
var currentUrl = window.location.href
var currentRegex
for (let i = 0; i < prohibitedTypes.length; i++) {
2017-08-03 23:48:19 +02:00
currentRegex = new RegExp(`\\.${prohibitedTypes[i]}$`)
2017-03-28 20:30:39 +02:00
if (currentRegex.test(currentUrl)) {
return false
}
}
return true
}
function redirectToPhishingWarning () {
console.log('MetaMask - redirecting to phishing warning')
window.location.href = 'https://metamask.io/phishing.html'
}