2023-04-25 16:32:51 +02:00
|
|
|
///: BEGIN:ONLY_INCLUDE_IN(snaps)
|
2023-01-24 16:03:01 +01:00
|
|
|
import { SubjectType } from '@metamask/subject-metadata-controller';
|
|
|
|
///: END:ONLY_INCLUDE_IN
|
2023-06-28 20:01:38 +02:00
|
|
|
import { ApprovalType } from '@metamask/controller-utils';
|
2022-10-28 10:37:33 +02:00
|
|
|
import {
|
|
|
|
createSelector,
|
|
|
|
createSelectorCreator,
|
|
|
|
defaultMemoize,
|
|
|
|
} from 'reselect';
|
|
|
|
import {
|
2023-04-25 16:32:51 +02:00
|
|
|
///: BEGIN:ONLY_INCLUDE_IN(snaps)
|
2022-10-28 10:37:33 +02:00
|
|
|
memoize,
|
|
|
|
///: END:ONLY_INCLUDE_IN
|
|
|
|
isEqual,
|
|
|
|
} from 'lodash';
|
2021-04-28 21:53:59 +02:00
|
|
|
import { addHexPrefix } from '../../app/scripts/lib/util';
|
2021-02-16 16:31:16 +01:00
|
|
|
import {
|
|
|
|
TEST_CHAINS,
|
2021-04-02 00:57:00 +02:00
|
|
|
NATIVE_CURRENCY_TOKEN_IMAGE_MAP,
|
2022-01-28 14:46:26 +01:00
|
|
|
BUYABLE_CHAINS_MAP,
|
2022-03-31 15:48:05 +02:00
|
|
|
MAINNET_DISPLAY_NAME,
|
|
|
|
BSC_DISPLAY_NAME,
|
|
|
|
POLYGON_DISPLAY_NAME,
|
|
|
|
AVALANCHE_DISPLAY_NAME,
|
2023-05-16 17:57:04 +02:00
|
|
|
AURORA_DISPLAY_NAME,
|
2022-08-02 23:56:02 +02:00
|
|
|
CHAIN_ID_TO_RPC_URL_MAP,
|
2022-09-14 16:55:31 +02:00
|
|
|
CHAIN_IDS,
|
|
|
|
NETWORK_TYPES,
|
NetworkController: Split `network` into `networkId` and `networkStatus` (#17556)
The `network` store of the network controller crams two types of data
into one place. It roughly tracks whether we have enough information to
make requests to the network and whether the network is capable of
receiving requests, but it also stores the ID of the network (as
obtained via `net_version`).
Generally we shouldn't be using the network ID for anything, as it has
been completely replaced by chain ID, which all custom RPC endpoints
have been required to support for over a year now. However, as the
network ID is used in various places within the extension codebase,
removing it entirely would be a non-trivial effort. So, minimally, this
commit splits `network` into two stores: `networkId` and
`networkStatus`. But it also expands the concept of network status.
Previously, the network was in one of two states: "loading" and
"not-loading". But now it can be in one of four states:
- `available`: The network is able to receive and respond to requests.
- `unavailable`: The network is not able to receive and respond to
requests for unknown reasons.
- `blocked`: The network is actively blocking requests based on the
user's geolocation. (This is specific to Infura.)
- `unknown`: We don't know whether the network can receive and respond
to requests, either because we haven't checked or we tried to check
and were unsuccessful.
This commit also changes how the network status is determined —
specifically, how many requests are used to determine that status, when
they occur, and whether they are awaited. Previously, the network
controller would make 2 to 3 requests during the course of running
`lookupNetwork`.
* First, if it was an Infura network, it would make a request for
`eth_blockNumber` to determine whether Infura was blocking requests or
not, then emit an appropriate event. This operation was not awaited.
* Then, regardless of the network, it would fetch the network ID via
`net_version`. This operation was awaited.
* Finally, regardless of the network, it would fetch the latest block
via `eth_getBlockByNumber`, then use the result to determine whether
the network supported EIP-1559. This operation was awaited.
Now:
* One fewer request is made, specifically `eth_blockNumber`, as we don't
need to make an extra request to determine whether Infura is blocking
requests; we can reuse `eth_getBlockByNumber`;
* All requests are awaited, which makes `lookupNetwork` run fully
in-band instead of partially out-of-band; and
* Both requests for `net_version` and `eth_getBlockByNumber` are
performed in parallel to make `lookupNetwork` run slightly faster.
2023-03-31 00:49:12 +02:00
|
|
|
NetworkStatus,
|
2023-03-31 19:58:25 +02:00
|
|
|
SEPOLIA_DISPLAY_NAME,
|
|
|
|
GOERLI_DISPLAY_NAME,
|
|
|
|
ETH_TOKEN_IMAGE_URL,
|
2023-06-15 13:38:07 +02:00
|
|
|
LINEA_GOERLI_DISPLAY_NAME,
|
2023-05-05 16:02:28 +02:00
|
|
|
CURRENCY_SYMBOLS,
|
|
|
|
TEST_NETWORK_TICKER_MAP,
|
2023-06-15 13:38:07 +02:00
|
|
|
LINEA_GOERLI_TOKEN_IMAGE_URL,
|
2023-06-16 18:35:33 +02:00
|
|
|
LINEA_MAINNET_DISPLAY_NAME,
|
2023-07-05 12:01:45 +02:00
|
|
|
LINEA_MAINNET_TOKEN_IMAGE_URL,
|
2021-04-28 21:53:59 +02:00
|
|
|
} from '../../shared/constants/network';
|
2021-10-21 21:17:03 +02:00
|
|
|
import {
|
2023-01-20 16:14:40 +01:00
|
|
|
WebHIDConnectedStatuses,
|
|
|
|
LedgerTransportTypes,
|
|
|
|
HardwareTransportStates,
|
2021-10-21 21:17:03 +02:00
|
|
|
} from '../../shared/constants/hardware-wallets';
|
2023-03-21 15:43:22 +01:00
|
|
|
import { KeyringType } from '../../shared/constants/keyring';
|
2023-01-24 16:03:01 +01:00
|
|
|
import { MESSAGE_TYPE } from '../../shared/constants/app';
|
2022-02-15 01:02:51 +01:00
|
|
|
|
|
|
|
import { TRUNCATED_NAME_CHAR_LIMIT } from '../../shared/constants/labels';
|
|
|
|
|
2021-04-02 00:57:00 +02:00
|
|
|
import {
|
|
|
|
SWAPS_CHAINID_DEFAULT_TOKEN_MAP,
|
2022-04-14 17:02:38 +02:00
|
|
|
ALLOWED_PROD_SWAPS_CHAIN_IDS,
|
|
|
|
ALLOWED_DEV_SWAPS_CHAIN_IDS,
|
2021-04-28 21:53:59 +02:00
|
|
|
} from '../../shared/constants/swaps';
|
2021-04-02 00:57:00 +02:00
|
|
|
|
2023-04-21 04:27:18 +02:00
|
|
|
import {
|
|
|
|
ALLOWED_BRIDGE_CHAIN_IDS,
|
|
|
|
ALLOWED_BRIDGE_TOKEN_ADDRESSES,
|
|
|
|
} from '../../shared/constants/bridge';
|
2023-03-23 18:24:10 +01:00
|
|
|
|
2022-08-02 23:56:02 +02:00
|
|
|
import {
|
|
|
|
shortenAddress,
|
|
|
|
getAccountByAddress,
|
|
|
|
getURLHostName,
|
2023-04-25 16:32:51 +02:00
|
|
|
///: BEGIN:ONLY_INCLUDE_IN(snaps)
|
2023-04-24 12:21:37 +02:00
|
|
|
removeSnapIdPrefix,
|
|
|
|
getSnapName,
|
|
|
|
///: END:ONLY_INCLUDE_IN
|
2022-08-02 23:56:02 +02:00
|
|
|
} from '../helpers/utils/util';
|
2021-04-02 00:57:00 +02:00
|
|
|
|
2023-05-10 07:36:01 +02:00
|
|
|
import { TEMPLATED_CONFIRMATION_APPROVAL_TYPES } from '../pages/confirmation/templates';
|
2022-08-10 03:26:25 +02:00
|
|
|
import { STATIC_MAINNET_TOKEN_LIST } from '../../shared/constants/tokens';
|
2021-06-05 08:33:58 +02:00
|
|
|
import { DAY } from '../../shared/constants/time';
|
2023-04-14 18:51:13 +02:00
|
|
|
import { TERMS_OF_USE_LAST_UPDATED } from '../../shared/constants/terms';
|
2021-06-24 01:28:49 +02:00
|
|
|
import {
|
|
|
|
getNativeCurrency,
|
2023-05-02 01:34:43 +02:00
|
|
|
getProviderConfig,
|
2021-06-24 01:28:49 +02:00
|
|
|
getConversionRate,
|
2021-09-30 13:57:59 +02:00
|
|
|
isNotEIP1559Network,
|
2021-08-03 00:52:18 +02:00
|
|
|
isEIP1559Network,
|
2021-10-21 21:17:03 +02:00
|
|
|
getLedgerTransportType,
|
|
|
|
isAddressLedger,
|
|
|
|
findKeyringForAddress,
|
2021-06-24 01:28:49 +02:00
|
|
|
} from '../ducks/metamask/metamask';
|
2021-11-04 19:19:53 +01:00
|
|
|
import {
|
|
|
|
getLedgerWebHidConnectedStatus,
|
|
|
|
getLedgerTransportStatus,
|
|
|
|
} from '../ducks/app/app';
|
2022-03-07 19:54:36 +01:00
|
|
|
import { isEqualCaseInsensitive } from '../../shared/modules/string-utils';
|
2023-01-18 15:47:29 +01:00
|
|
|
import { TransactionStatus } from '../../shared/constants/transaction';
|
2023-01-20 18:04:37 +01:00
|
|
|
import {
|
|
|
|
getValueFromWeiHex,
|
|
|
|
hexToDecimal,
|
|
|
|
} from '../../shared/modules/conversion.utils';
|
2023-07-17 18:43:26 +02:00
|
|
|
import { BackgroundColor } from '../helpers/constants/design-system';
|
2023-04-25 16:32:51 +02:00
|
|
|
///: BEGIN:ONLY_INCLUDE_IN(snaps)
|
2022-04-19 17:08:09 +02:00
|
|
|
import { SNAPS_VIEW_ROUTE } from '../helpers/constants/routes';
|
2022-09-20 19:00:07 +02:00
|
|
|
import { getPermissionSubjects } from './permissions';
|
2022-04-19 17:08:09 +02:00
|
|
|
///: END:ONLY_INCLUDE_IN
|
2021-04-02 00:57:00 +02:00
|
|
|
|
2021-03-12 23:23:26 +01:00
|
|
|
/**
|
NetworkController: Split `network` into `networkId` and `networkStatus` (#17556)
The `network` store of the network controller crams two types of data
into one place. It roughly tracks whether we have enough information to
make requests to the network and whether the network is capable of
receiving requests, but it also stores the ID of the network (as
obtained via `net_version`).
Generally we shouldn't be using the network ID for anything, as it has
been completely replaced by chain ID, which all custom RPC endpoints
have been required to support for over a year now. However, as the
network ID is used in various places within the extension codebase,
removing it entirely would be a non-trivial effort. So, minimally, this
commit splits `network` into two stores: `networkId` and
`networkStatus`. But it also expands the concept of network status.
Previously, the network was in one of two states: "loading" and
"not-loading". But now it can be in one of four states:
- `available`: The network is able to receive and respond to requests.
- `unavailable`: The network is not able to receive and respond to
requests for unknown reasons.
- `blocked`: The network is actively blocking requests based on the
user's geolocation. (This is specific to Infura.)
- `unknown`: We don't know whether the network can receive and respond
to requests, either because we haven't checked or we tried to check
and were unsuccessful.
This commit also changes how the network status is determined —
specifically, how many requests are used to determine that status, when
they occur, and whether they are awaited. Previously, the network
controller would make 2 to 3 requests during the course of running
`lookupNetwork`.
* First, if it was an Infura network, it would make a request for
`eth_blockNumber` to determine whether Infura was blocking requests or
not, then emit an appropriate event. This operation was not awaited.
* Then, regardless of the network, it would fetch the network ID via
`net_version`. This operation was awaited.
* Finally, regardless of the network, it would fetch the latest block
via `eth_getBlockByNumber`, then use the result to determine whether
the network supported EIP-1559. This operation was awaited.
Now:
* One fewer request is made, specifically `eth_blockNumber`, as we don't
need to make an extra request to determine whether Infura is blocking
requests; we can reuse `eth_getBlockByNumber`;
* All requests are awaited, which makes `lookupNetwork` run fully
in-band instead of partially out-of-band; and
* Both requests for `net_version` and `eth_getBlockByNumber` are
performed in parallel to make `lookupNetwork` run slightly faster.
2023-03-31 00:49:12 +02:00
|
|
|
* Returns true if the currently selected network is inaccessible or whether no
|
|
|
|
* provider has been set yet for the currently selected network.
|
2021-03-12 23:23:26 +01:00
|
|
|
*
|
NetworkController: Split `network` into `networkId` and `networkStatus` (#17556)
The `network` store of the network controller crams two types of data
into one place. It roughly tracks whether we have enough information to
make requests to the network and whether the network is capable of
receiving requests, but it also stores the ID of the network (as
obtained via `net_version`).
Generally we shouldn't be using the network ID for anything, as it has
been completely replaced by chain ID, which all custom RPC endpoints
have been required to support for over a year now. However, as the
network ID is used in various places within the extension codebase,
removing it entirely would be a non-trivial effort. So, minimally, this
commit splits `network` into two stores: `networkId` and
`networkStatus`. But it also expands the concept of network status.
Previously, the network was in one of two states: "loading" and
"not-loading". But now it can be in one of four states:
- `available`: The network is able to receive and respond to requests.
- `unavailable`: The network is not able to receive and respond to
requests for unknown reasons.
- `blocked`: The network is actively blocking requests based on the
user's geolocation. (This is specific to Infura.)
- `unknown`: We don't know whether the network can receive and respond
to requests, either because we haven't checked or we tried to check
and were unsuccessful.
This commit also changes how the network status is determined —
specifically, how many requests are used to determine that status, when
they occur, and whether they are awaited. Previously, the network
controller would make 2 to 3 requests during the course of running
`lookupNetwork`.
* First, if it was an Infura network, it would make a request for
`eth_blockNumber` to determine whether Infura was blocking requests or
not, then emit an appropriate event. This operation was not awaited.
* Then, regardless of the network, it would fetch the network ID via
`net_version`. This operation was awaited.
* Finally, regardless of the network, it would fetch the latest block
via `eth_getBlockByNumber`, then use the result to determine whether
the network supported EIP-1559. This operation was awaited.
Now:
* One fewer request is made, specifically `eth_blockNumber`, as we don't
need to make an extra request to determine whether Infura is blocking
requests; we can reuse `eth_getBlockByNumber`;
* All requests are awaited, which makes `lookupNetwork` run fully
in-band instead of partially out-of-band; and
* Both requests for `net_version` and `eth_getBlockByNumber` are
performed in parallel to make `lookupNetwork` run slightly faster.
2023-03-31 00:49:12 +02:00
|
|
|
* @param {object} state - Redux state object.
|
2021-03-12 23:23:26 +01:00
|
|
|
*/
|
|
|
|
export function isNetworkLoading(state) {
|
NetworkController: Split `network` into `networkId` and `networkStatus` (#17556)
The `network` store of the network controller crams two types of data
into one place. It roughly tracks whether we have enough information to
make requests to the network and whether the network is capable of
receiving requests, but it also stores the ID of the network (as
obtained via `net_version`).
Generally we shouldn't be using the network ID for anything, as it has
been completely replaced by chain ID, which all custom RPC endpoints
have been required to support for over a year now. However, as the
network ID is used in various places within the extension codebase,
removing it entirely would be a non-trivial effort. So, minimally, this
commit splits `network` into two stores: `networkId` and
`networkStatus`. But it also expands the concept of network status.
Previously, the network was in one of two states: "loading" and
"not-loading". But now it can be in one of four states:
- `available`: The network is able to receive and respond to requests.
- `unavailable`: The network is not able to receive and respond to
requests for unknown reasons.
- `blocked`: The network is actively blocking requests based on the
user's geolocation. (This is specific to Infura.)
- `unknown`: We don't know whether the network can receive and respond
to requests, either because we haven't checked or we tried to check
and were unsuccessful.
This commit also changes how the network status is determined —
specifically, how many requests are used to determine that status, when
they occur, and whether they are awaited. Previously, the network
controller would make 2 to 3 requests during the course of running
`lookupNetwork`.
* First, if it was an Infura network, it would make a request for
`eth_blockNumber` to determine whether Infura was blocking requests or
not, then emit an appropriate event. This operation was not awaited.
* Then, regardless of the network, it would fetch the network ID via
`net_version`. This operation was awaited.
* Finally, regardless of the network, it would fetch the latest block
via `eth_getBlockByNumber`, then use the result to determine whether
the network supported EIP-1559. This operation was awaited.
Now:
* One fewer request is made, specifically `eth_blockNumber`, as we don't
need to make an extra request to determine whether Infura is blocking
requests; we can reuse `eth_getBlockByNumber`;
* All requests are awaited, which makes `lookupNetwork` run fully
in-band instead of partially out-of-band; and
* Both requests for `net_version` and `eth_getBlockByNumber` are
performed in parallel to make `lookupNetwork` run slightly faster.
2023-03-31 00:49:12 +02:00
|
|
|
return state.metamask.networkStatus !== NetworkStatus.Available;
|
2021-03-12 23:23:26 +01:00
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getNetworkIdentifier(state) {
|
2023-05-02 14:36:24 +02:00
|
|
|
const { type, nickname, rpcUrl } = getProviderConfig(state);
|
2018-12-05 13:34:19 +01:00
|
|
|
|
2021-02-04 19:15:23 +01:00
|
|
|
return nickname || rpcUrl || type;
|
2018-12-05 13:34:19 +01:00
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getCurrentChainId(state) {
|
2023-05-02 14:36:24 +02:00
|
|
|
const { chainId } = getProviderConfig(state);
|
2021-02-04 19:15:23 +01:00
|
|
|
return chainId;
|
2020-10-21 23:10:55 +02:00
|
|
|
}
|
|
|
|
|
2023-04-27 16:28:08 +02:00
|
|
|
export function getMetaMetricsId(state) {
|
|
|
|
const { metaMetricsId } = state.metamask;
|
|
|
|
return metaMetricsId;
|
|
|
|
}
|
|
|
|
|
2022-10-27 12:25:30 +02:00
|
|
|
export function isCurrentProviderCustom(state) {
|
2023-05-02 01:34:43 +02:00
|
|
|
const provider = getProviderConfig(state);
|
2022-10-27 12:25:30 +02:00
|
|
|
return (
|
|
|
|
provider.type === NETWORK_TYPES.RPC &&
|
|
|
|
!Object.values(CHAIN_IDS).includes(provider.chainId)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2021-11-23 18:28:39 +01:00
|
|
|
export function getCurrentQRHardwareState(state) {
|
|
|
|
const { qrHardware } = state.metamask;
|
|
|
|
return qrHardware || {};
|
|
|
|
}
|
|
|
|
|
|
|
|
export function hasUnsignedQRHardwareTransaction(state) {
|
|
|
|
const { txParams } = state.confirmTransaction.txData;
|
2022-01-06 23:56:51 +01:00
|
|
|
if (!txParams) {
|
|
|
|
return false;
|
|
|
|
}
|
2021-11-23 18:28:39 +01:00
|
|
|
const { from } = txParams;
|
|
|
|
const { keyrings } = state.metamask;
|
2023-03-21 15:43:22 +01:00
|
|
|
const qrKeyring = keyrings.find((kr) => kr.type === KeyringType.qr);
|
2022-01-06 23:56:51 +01:00
|
|
|
if (!qrKeyring) {
|
|
|
|
return false;
|
|
|
|
}
|
2021-11-23 18:28:39 +01:00
|
|
|
return Boolean(
|
|
|
|
qrKeyring.accounts.find(
|
|
|
|
(account) => account.toLowerCase() === from.toLowerCase(),
|
|
|
|
),
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
export function hasUnsignedQRHardwareMessage(state) {
|
|
|
|
const { type, msgParams } = state.confirmTransaction.txData;
|
|
|
|
if (!type || !msgParams) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
const { from } = msgParams;
|
|
|
|
const { keyrings } = state.metamask;
|
2023-03-21 15:43:22 +01:00
|
|
|
const qrKeyring = keyrings.find((kr) => kr.type === KeyringType.qr);
|
2022-01-06 23:56:51 +01:00
|
|
|
if (!qrKeyring) {
|
|
|
|
return false;
|
|
|
|
}
|
2021-11-23 18:28:39 +01:00
|
|
|
switch (type) {
|
|
|
|
case MESSAGE_TYPE.ETH_SIGN_TYPED_DATA:
|
|
|
|
case MESSAGE_TYPE.ETH_SIGN:
|
|
|
|
case MESSAGE_TYPE.PERSONAL_SIGN:
|
|
|
|
return Boolean(
|
|
|
|
qrKeyring.accounts.find(
|
|
|
|
(account) => account.toLowerCase() === from.toLowerCase(),
|
|
|
|
),
|
|
|
|
);
|
|
|
|
default:
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getCurrentKeyring(state) {
|
2021-02-04 19:15:23 +01:00
|
|
|
const identity = getSelectedIdentity(state);
|
2019-03-05 16:45:01 +01:00
|
|
|
|
|
|
|
if (!identity) {
|
2021-02-04 19:15:23 +01:00
|
|
|
return null;
|
2019-03-05 16:45:01 +01:00
|
|
|
}
|
|
|
|
|
2021-10-21 21:17:03 +02:00
|
|
|
const keyring = findKeyringForAddress(state, identity.address);
|
2019-03-05 16:45:01 +01:00
|
|
|
|
2021-02-04 19:15:23 +01:00
|
|
|
return keyring;
|
2019-03-05 16:45:01 +01:00
|
|
|
}
|
|
|
|
|
2021-09-30 13:57:59 +02:00
|
|
|
/**
|
|
|
|
* The function returns true if network and account details are fetched and
|
|
|
|
* both of them support EIP-1559.
|
2022-01-07 16:57:33 +01:00
|
|
|
*
|
|
|
|
* @param state
|
2021-09-30 13:57:59 +02:00
|
|
|
*/
|
2021-08-03 00:52:18 +02:00
|
|
|
export function checkNetworkAndAccountSupports1559(state) {
|
|
|
|
const networkSupports1559 = isEIP1559Network(state);
|
2023-03-28 16:50:02 +02:00
|
|
|
return networkSupports1559;
|
2021-08-03 00:52:18 +02:00
|
|
|
}
|
|
|
|
|
2021-09-30 13:57:59 +02:00
|
|
|
/**
|
|
|
|
* The function returns true if network and account details are fetched and
|
|
|
|
* either of them do not support EIP-1559.
|
2022-01-07 16:57:33 +01:00
|
|
|
*
|
|
|
|
* @param state
|
2021-09-30 13:57:59 +02:00
|
|
|
*/
|
|
|
|
export function checkNetworkOrAccountNotSupports1559(state) {
|
|
|
|
const networkNotSupports1559 = isNotEIP1559Network(state);
|
2023-03-28 16:50:02 +02:00
|
|
|
return networkNotSupports1559;
|
2021-09-30 13:57:59 +02:00
|
|
|
}
|
|
|
|
|
2021-05-06 16:14:42 +02:00
|
|
|
/**
|
|
|
|
* Checks if the current wallet is a hardware wallet.
|
2022-01-07 16:57:33 +01:00
|
|
|
*
|
2022-07-27 15:28:05 +02:00
|
|
|
* @param {object} state
|
2022-01-07 16:57:33 +01:00
|
|
|
* @returns {boolean}
|
2021-05-06 16:14:42 +02:00
|
|
|
*/
|
|
|
|
export function isHardwareWallet(state) {
|
|
|
|
const keyring = getCurrentKeyring(state);
|
2021-08-27 17:46:56 +02:00
|
|
|
return Boolean(keyring?.type?.includes('Hardware'));
|
2021-05-06 16:14:42 +02:00
|
|
|
}
|
|
|
|
|
2021-05-12 17:17:17 +02:00
|
|
|
/**
|
|
|
|
* Get a HW wallet type, e.g. "Ledger Hardware"
|
2022-01-07 16:57:33 +01:00
|
|
|
*
|
2022-07-27 15:28:05 +02:00
|
|
|
* @param {object} state
|
2022-01-07 16:57:33 +01:00
|
|
|
* @returns {string | undefined}
|
2021-05-12 17:17:17 +02:00
|
|
|
*/
|
|
|
|
export function getHardwareWalletType(state) {
|
|
|
|
const keyring = getCurrentKeyring(state);
|
2021-08-27 17:46:56 +02:00
|
|
|
return isHardwareWallet(state) ? keyring.type : undefined;
|
2021-05-12 17:17:17 +02:00
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getAccountType(state) {
|
2021-02-04 19:15:23 +01:00
|
|
|
const currentKeyring = getCurrentKeyring(state);
|
2023-04-27 16:28:08 +02:00
|
|
|
return getAccountTypeForKeyring(currentKeyring);
|
|
|
|
}
|
|
|
|
|
|
|
|
export function getAccountTypeForKeyring(keyring) {
|
|
|
|
if (!keyring) {
|
|
|
|
return '';
|
|
|
|
}
|
|
|
|
|
|
|
|
const { type } = keyring;
|
2019-03-05 16:45:01 +01:00
|
|
|
|
2023-04-25 16:32:51 +02:00
|
|
|
///: BEGIN:ONLY_INCLUDE_IN(build-mmi)
|
2023-04-17 10:22:53 +02:00
|
|
|
if (type.startsWith('Custody')) {
|
|
|
|
return 'custody';
|
|
|
|
}
|
|
|
|
///: END:ONLY_INCLUDE_IN
|
|
|
|
|
2019-03-05 16:45:01 +01:00
|
|
|
switch (type) {
|
2023-03-21 15:43:22 +01:00
|
|
|
case KeyringType.trezor:
|
|
|
|
case KeyringType.ledger:
|
|
|
|
case KeyringType.lattice:
|
2023-04-27 16:28:08 +02:00
|
|
|
case KeyringType.qr:
|
2021-02-04 19:15:23 +01:00
|
|
|
return 'hardware';
|
2023-03-21 15:43:22 +01:00
|
|
|
case KeyringType.imported:
|
2021-02-04 19:15:23 +01:00
|
|
|
return 'imported';
|
2019-03-05 16:45:01 +01:00
|
|
|
default:
|
2021-02-04 19:15:23 +01:00
|
|
|
return 'default';
|
2019-03-05 16:45:01 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-12 23:23:26 +01:00
|
|
|
/**
|
|
|
|
* get the currently selected networkId which will be 'loading' when the
|
|
|
|
* network changes. The network id should not be used in most cases,
|
|
|
|
* instead use chainId in most situations. There are a limited number of
|
|
|
|
* use cases to use this method still, such as when comparing transaction
|
|
|
|
* metadata that predates the switch to using chainId.
|
2022-01-07 16:57:33 +01:00
|
|
|
*
|
2021-03-12 23:23:26 +01:00
|
|
|
* @deprecated - use getCurrentChainId instead
|
2022-07-27 15:28:05 +02:00
|
|
|
* @param {object} state - redux state object
|
2021-03-12 23:23:26 +01:00
|
|
|
*/
|
|
|
|
export function deprecatedGetCurrentNetworkId(state) {
|
NetworkController: Split `network` into `networkId` and `networkStatus` (#17556)
The `network` store of the network controller crams two types of data
into one place. It roughly tracks whether we have enough information to
make requests to the network and whether the network is capable of
receiving requests, but it also stores the ID of the network (as
obtained via `net_version`).
Generally we shouldn't be using the network ID for anything, as it has
been completely replaced by chain ID, which all custom RPC endpoints
have been required to support for over a year now. However, as the
network ID is used in various places within the extension codebase,
removing it entirely would be a non-trivial effort. So, minimally, this
commit splits `network` into two stores: `networkId` and
`networkStatus`. But it also expands the concept of network status.
Previously, the network was in one of two states: "loading" and
"not-loading". But now it can be in one of four states:
- `available`: The network is able to receive and respond to requests.
- `unavailable`: The network is not able to receive and respond to
requests for unknown reasons.
- `blocked`: The network is actively blocking requests based on the
user's geolocation. (This is specific to Infura.)
- `unknown`: We don't know whether the network can receive and respond
to requests, either because we haven't checked or we tried to check
and were unsuccessful.
This commit also changes how the network status is determined —
specifically, how many requests are used to determine that status, when
they occur, and whether they are awaited. Previously, the network
controller would make 2 to 3 requests during the course of running
`lookupNetwork`.
* First, if it was an Infura network, it would make a request for
`eth_blockNumber` to determine whether Infura was blocking requests or
not, then emit an appropriate event. This operation was not awaited.
* Then, regardless of the network, it would fetch the network ID via
`net_version`. This operation was awaited.
* Finally, regardless of the network, it would fetch the latest block
via `eth_getBlockByNumber`, then use the result to determine whether
the network supported EIP-1559. This operation was awaited.
Now:
* One fewer request is made, specifically `eth_blockNumber`, as we don't
need to make an extra request to determine whether Infura is blocking
requests; we can reuse `eth_getBlockByNumber`;
* All requests are awaited, which makes `lookupNetwork` run fully
in-band instead of partially out-of-band; and
* Both requests for `net_version` and `eth_getBlockByNumber` are
performed in parallel to make `lookupNetwork` run slightly faster.
2023-03-31 00:49:12 +02:00
|
|
|
return state.metamask.networkId ?? 'loading';
|
2019-03-05 16:45:01 +01:00
|
|
|
}
|
|
|
|
|
2019-12-04 03:21:55 +01:00
|
|
|
export const getMetaMaskAccounts = createSelector(
|
|
|
|
getMetaMaskAccountsRaw,
|
|
|
|
getMetaMaskCachedBalances,
|
2020-11-03 00:41:28 +01:00
|
|
|
(currentAccounts, cachedBalances) =>
|
|
|
|
Object.entries(currentAccounts).reduce(
|
|
|
|
(selectedAccounts, [accountID, account]) => {
|
|
|
|
if (account.balance === null || account.balance === undefined) {
|
|
|
|
return {
|
|
|
|
...selectedAccounts,
|
|
|
|
[accountID]: {
|
|
|
|
...account,
|
|
|
|
balance: cachedBalances && cachedBalances[accountID],
|
|
|
|
},
|
2021-02-04 19:15:23 +01:00
|
|
|
};
|
2020-11-03 00:41:28 +01:00
|
|
|
}
|
|
|
|
return {
|
|
|
|
...selectedAccounts,
|
|
|
|
[accountID]: account,
|
2021-02-04 19:15:23 +01:00
|
|
|
};
|
2020-11-03 00:41:28 +01:00
|
|
|
},
|
|
|
|
{},
|
|
|
|
),
|
2021-02-04 19:15:23 +01:00
|
|
|
);
|
2019-12-04 03:21:55 +01:00
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getSelectedAddress(state) {
|
2021-02-04 19:15:23 +01:00
|
|
|
return state.metamask.selectedAddress;
|
2017-08-10 06:40:01 +02:00
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getSelectedIdentity(state) {
|
2021-02-04 19:15:23 +01:00
|
|
|
const selectedAddress = getSelectedAddress(state);
|
|
|
|
const { identities } = state.metamask;
|
2017-08-10 06:40:01 +02:00
|
|
|
|
2021-02-04 19:15:23 +01:00
|
|
|
return identities[selectedAddress];
|
2017-08-10 06:40:01 +02:00
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getNumberOfTokens(state) {
|
2021-02-04 19:15:23 +01:00
|
|
|
const { tokens } = state.metamask;
|
|
|
|
return tokens ? tokens.length : 0;
|
2019-03-05 16:45:01 +01:00
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getMetaMaskKeyrings(state) {
|
2021-02-04 19:15:23 +01:00
|
|
|
return state.metamask.keyrings;
|
2019-12-04 03:21:55 +01:00
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getMetaMaskIdentities(state) {
|
2021-02-04 19:15:23 +01:00
|
|
|
return state.metamask.identities;
|
2019-12-04 03:21:55 +01:00
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getMetaMaskAccountsRaw(state) {
|
2021-02-04 19:15:23 +01:00
|
|
|
return state.metamask.accounts;
|
2018-11-30 23:51:24 +01:00
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getMetaMaskCachedBalances(state) {
|
2021-03-02 23:53:07 +01:00
|
|
|
const chainId = getCurrentChainId(state);
|
|
|
|
|
|
|
|
// Fallback to fetching cached balances from network id
|
|
|
|
// this can eventually be removed
|
2021-03-12 23:23:26 +01:00
|
|
|
const network = deprecatedGetCurrentNetworkId(state);
|
2019-12-04 03:21:55 +01:00
|
|
|
|
2021-03-02 23:53:07 +01:00
|
|
|
return (
|
|
|
|
state.metamask.cachedBalances[chainId] ??
|
|
|
|
state.metamask.cachedBalances[network]
|
|
|
|
);
|
2019-12-04 03:21:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Get ordered (by keyrings) accounts with identity and balance
|
|
|
|
*/
|
|
|
|
export const getMetaMaskAccountsOrdered = createSelector(
|
|
|
|
getMetaMaskKeyrings,
|
|
|
|
getMetaMaskIdentities,
|
|
|
|
getMetaMaskAccounts,
|
2020-11-03 00:41:28 +01:00
|
|
|
(keyrings, identities, accounts) =>
|
|
|
|
keyrings
|
|
|
|
.reduce((list, keyring) => list.concat(keyring.accounts), [])
|
|
|
|
.filter((address) => Boolean(identities[address]))
|
|
|
|
.map((address) => ({ ...identities[address], ...accounts[address] })),
|
2021-02-04 19:15:23 +01:00
|
|
|
);
|
2019-12-04 03:21:55 +01:00
|
|
|
|
2021-03-09 21:39:16 +01:00
|
|
|
export const getMetaMaskAccountsConnected = createSelector(
|
|
|
|
getMetaMaskAccountsOrdered,
|
|
|
|
(connectedAccounts) =>
|
|
|
|
connectedAccounts.map(({ address }) => address.toLowerCase()),
|
|
|
|
);
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function isBalanceCached(state) {
|
|
|
|
const selectedAccountBalance =
|
2021-02-04 19:15:23 +01:00
|
|
|
state.metamask.accounts[getSelectedAddress(state)].balance;
|
|
|
|
const cachedBalance = getSelectedAccountCachedBalance(state);
|
2019-01-30 13:16:12 +01:00
|
|
|
|
2021-02-04 19:15:23 +01:00
|
|
|
return Boolean(!selectedAccountBalance && cachedBalance);
|
2019-01-30 13:16:12 +01:00
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getSelectedAccountCachedBalance(state) {
|
2021-03-02 23:53:07 +01:00
|
|
|
const cachedBalances = getMetaMaskCachedBalances(state);
|
2021-02-04 19:15:23 +01:00
|
|
|
const selectedAddress = getSelectedAddress(state);
|
2019-01-30 13:16:12 +01:00
|
|
|
|
2021-02-04 19:15:23 +01:00
|
|
|
return cachedBalances && cachedBalances[selectedAddress];
|
2019-01-30 13:16:12 +01:00
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getSelectedAccount(state) {
|
2021-02-04 19:15:23 +01:00
|
|
|
const accounts = getMetaMaskAccounts(state);
|
|
|
|
const selectedAddress = getSelectedAddress(state);
|
2017-08-10 06:40:01 +02:00
|
|
|
|
2021-02-04 19:15:23 +01:00
|
|
|
return accounts[selectedAddress];
|
2017-08-11 04:35:01 +02:00
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getTargetAccount(state, targetAddress) {
|
2021-02-04 19:15:23 +01:00
|
|
|
const accounts = getMetaMaskAccounts(state);
|
|
|
|
return accounts[targetAddress];
|
2020-03-11 19:40:35 +01:00
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export const getTokenExchangeRates = (state) =>
|
2021-02-04 19:15:23 +01:00
|
|
|
state.metamask.contractExchangeRates;
|
2017-10-13 22:19:22 +02:00
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getAddressBook(state) {
|
2021-02-04 19:15:23 +01:00
|
|
|
const chainId = getCurrentChainId(state);
|
2020-10-13 01:35:55 +02:00
|
|
|
if (!state.metamask.addressBook[chainId]) {
|
2021-02-04 19:15:23 +01:00
|
|
|
return [];
|
2019-09-21 19:36:06 +02:00
|
|
|
}
|
2021-02-04 19:15:23 +01:00
|
|
|
return Object.values(state.metamask.addressBook[chainId]);
|
2019-07-31 21:56:44 +02:00
|
|
|
}
|
|
|
|
|
2022-06-13 18:18:33 +02:00
|
|
|
export function getEnsResolutionByAddress(state, address) {
|
2022-11-30 16:24:28 +01:00
|
|
|
if (state.metamask.ensResolutionsByAddress[address]) {
|
|
|
|
return state.metamask.ensResolutionsByAddress[address];
|
|
|
|
}
|
|
|
|
|
|
|
|
const entry =
|
|
|
|
getAddressBookEntry(state, address) ||
|
|
|
|
Object.values(state.metamask.identities).find((identity) =>
|
2023-02-27 17:33:21 +01:00
|
|
|
isEqualCaseInsensitive(identity.address, address),
|
2022-11-30 16:24:28 +01:00
|
|
|
);
|
|
|
|
|
|
|
|
return entry?.name || '';
|
2022-06-13 18:18:33 +02:00
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getAddressBookEntry(state, address) {
|
2021-02-04 19:15:23 +01:00
|
|
|
const addressBook = getAddressBook(state);
|
2021-09-10 19:37:19 +02:00
|
|
|
const entry = addressBook.find((contact) =>
|
2023-02-27 17:33:21 +01:00
|
|
|
isEqualCaseInsensitive(contact.address, address),
|
2021-02-04 19:15:23 +01:00
|
|
|
);
|
|
|
|
return entry;
|
2019-07-31 21:56:44 +02:00
|
|
|
}
|
|
|
|
|
2021-11-04 07:58:32 +01:00
|
|
|
export function getAddressBookEntryOrAccountName(state, address) {
|
2020-11-03 00:41:28 +01:00
|
|
|
const entry =
|
2021-11-04 07:58:32 +01:00
|
|
|
getAddressBookEntry(state, address) ||
|
|
|
|
Object.values(state.metamask.identities).find((identity) =>
|
2023-02-27 17:33:21 +01:00
|
|
|
isEqualCaseInsensitive(identity.address, address),
|
2021-11-04 07:58:32 +01:00
|
|
|
);
|
|
|
|
return entry && entry.name !== '' ? entry.name : address;
|
2017-10-17 17:46:36 +02:00
|
|
|
}
|
|
|
|
|
2022-11-10 11:28:34 +01:00
|
|
|
export function getAccountName(identities, address) {
|
|
|
|
const entry = Object.values(identities).find((identity) =>
|
2023-02-27 17:33:21 +01:00
|
|
|
isEqualCaseInsensitive(identity.address, address),
|
2022-11-08 09:34:21 +01:00
|
|
|
);
|
|
|
|
return entry && entry.name !== '' ? entry.name : '';
|
|
|
|
}
|
|
|
|
|
2022-11-10 11:28:34 +01:00
|
|
|
export function getMetadataContractName(state, address) {
|
|
|
|
const tokenList = getTokenList(state);
|
|
|
|
const entry = Object.values(tokenList).find((identity) =>
|
2023-02-27 17:33:21 +01:00
|
|
|
isEqualCaseInsensitive(identity.address, address),
|
2022-11-08 09:34:21 +01:00
|
|
|
);
|
|
|
|
return entry && entry.name !== '' ? entry.name : '';
|
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function accountsWithSendEtherInfoSelector(state) {
|
2021-02-04 19:15:23 +01:00
|
|
|
const accounts = getMetaMaskAccounts(state);
|
|
|
|
const identities = getMetaMaskIdentities(state);
|
2017-10-13 22:19:22 +02:00
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
const accountsWithSendEtherInfo = Object.entries(identities).map(
|
|
|
|
([key, identity]) => {
|
2021-02-04 19:15:23 +01:00
|
|
|
return { ...identity, ...accounts[key] };
|
2020-11-03 00:41:28 +01:00
|
|
|
},
|
2021-02-04 19:15:23 +01:00
|
|
|
);
|
2017-10-13 22:19:22 +02:00
|
|
|
|
2021-02-04 19:15:23 +01:00
|
|
|
return accountsWithSendEtherInfo;
|
2017-10-13 22:19:22 +02:00
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getAccountsWithLabels(state) {
|
|
|
|
return getMetaMaskAccountsOrdered(state).map(
|
|
|
|
({ address, name, balance }) => ({
|
|
|
|
address,
|
2021-10-13 19:54:48 +02:00
|
|
|
addressLabel: `${
|
|
|
|
name.length < TRUNCATED_NAME_CHAR_LIMIT
|
|
|
|
? name
|
|
|
|
: `${name.slice(0, TRUNCATED_NAME_CHAR_LIMIT - 1)}...`
|
|
|
|
} (${shortenAddress(address)})`,
|
2020-11-03 00:41:28 +01:00
|
|
|
label: name,
|
|
|
|
balance,
|
|
|
|
}),
|
2021-02-04 19:15:23 +01:00
|
|
|
);
|
Connect distinct accounts per site (#7004)
* add PermissionsController
remove provider approval controller
integrate rpc-cap
create PermissionsController
move provider approval functionality to permissions controller
add permissions approval ui, settings page
add permissions activity and history
move some functionality to metamask-inpage-provider
rename siteMetadata -> domainMetadata
add accountsChange notification to inpage provider
move functionality to inpage provider
update inpage provider
Remove 'Connections' settings page (#7369)
add hooks for exposing accounts in settings
rename unused messages in non-English locales
Add external extension id to metadata (#7396)
update inpage provider, rpc-cap
add eth_requestAccounts handling to background
prevent notifying connections if extension is locked
update inpage provider
Fix lint errors
add migration
review fixes
transaction controller review updates
removed unused messages
* Login Per Site UI (#7368)
* LoginPerSite original UI changes to keep
* First commit
* Get necessary connected tab info for redirect and icon display for permissioned sites
* Fix up designs and add missing features
* Some lint fixes
* More lint fixes
* Ensures the tx controller + tx-state-manager orders transactions in the order they are received
* Code cleanup for LoginPerSite-ui
* Update e2e tests to use new connection flow
* Fix display of connect screen and app header after login when connect request present
* Update metamask-responsive-ui.spec for new item in accounts dropdown
* Fix approve container by replacing approvedOrigins with domainMetaData
* Adds test/e2e/permissions.spec.js
* Correctly handle cancellation of a permissions request
* Redirect to home after disconnecting all sites / cancelling all permissions
* Fix display of site icons in menu
* Fix height of permissions page container
* Remove unused locale messages
* Set default values for openExternalTabs and tabIdOrigins in account-menu.container
* More code cleanup for LoginPerSite-ui
* Use extensions api to close tab in permissions-connect
* Remove unnecessary change in domIsReady() in contentscript
* Remove unnecessary private function markers and class methods (for background tab info) in metamask-controller.
* Adds getOriginOfCurrentTab selector
* Adds IconWithFallback component and substitutes for appropriate cases
* Add and utilize font mixins
* Remove unused method in disconnect-all.container.js
* Simplify buttonSizeLarge code in page-container-footer.component.js
* Add and utilize getAccountsWithLabels selector
* Remove console.log in ui/app/store/actions.js
* Change last connected time format to yyyy-M-d
* Fix css associated with IconWithFallback change
* Ensure tracked openNonMetamaskTabsIDs are correctly set to inactive on tab changes
* Code cleanup for LoginPerSite-ui
* Use reusable function for modifying openNonMetamaskTabsIDs in background.js
* Enables automatic switching to connected account when connected domain is open
* Prevent exploit of tabIdOriginMap in background.js
* Remove unneeded code from contentscript.js
* Simplify current tab origin and window opener logic using remotePort listener tabs.queryTabs
* Design and styling fixes for LoginPerSite-ui
* Fix permissionHistory and permission logging for eth_requestAccounts and eth_accounts
* Front end changes to support display of lastConnected time in connected and permissions screens
* Fix lint errors
* Refactor structure of permissionsHistory
* Fix default values and object modifications for domain and permissionsHistory related data
* Fix connecting to new accounts from modal
* Replace retweet.svg with connect-white.svg
* Fix signature-request.spec
* Update metamask-inpage-provider version
* Fix permissions e2e tests
* Remove unneeded delay from test/e2e/signature-request.spec.js
* Add delay before attempting to retrieve network id in dapp in ethereum-on=.spec
* Use requestAccountTabIds strategy for determining tab id that opened a given window
* Improve default values for permissions requests
* Add some message descriptions to app/_locales/en/messages.json
* Code clean up in permission controller
* Stopped deep cloning object in mapObjectValues
* Bump metamask-inpage-provider version
* Add missing description in app/_locales/en/messages.json
* Return promises from queryTabs and switchToTab of extension.js
* Remove unused getAllPermissions function
* Use default props in icon-with-fallback.component.js
* Stop passing to permissions controller
* Delete no longer used clear-approved-origins modal code
* Remove duplicate imports in ui/app/components/app/index.scss
* Use URL instead of regex in getOriginFromUrl()
* Add runtime error checking to platform, promise based extension.tab methods
* Support permission requests from external extensions
* Improve font size and colour of the domain origin on the permission confirmation screen
* Add support for toggling permissions
* Ensure getRenderablePermissionsDomains only returns domains with exposedAccount caveat permissions
* Remove unused code from LoginPerSite-ui branch
* Ensure modal closes on Enter press for new-account-modal.component.js
* Lint fix
* fixup! Login Per Site UI (#7368)
* Some code cleanup for LoginPerSite
* Adds UX for connecting to dapps via the connected sites screen (#7593)
* Adds UX for connecting to dapps via the connected sites screen
* Use openMetaMaskTabIds from background.js to determine if current active tab is MetaMask
* Delete unused permissions controller methods
* Fixes two small bugs in the LoginPerSite ui (#7595)
* Restore `providerRequest` message translations (#7600)
This message was removed, but it was replaced with a very similar
message called `likeToConnect`. The only difference is that the new
message has "MetaMask" in it. Preserving these messages without
"MetaMask" is probably better than deleting them, so these messages
have all been restored and renamed to `likeToConnect`.
* Login per site no sitemetadata fix (#7610)
* Support connected sites for which we have no site metadata.
* Change property containing subtitle info often populated by origin to a more accurate of purpose name
* Lint fix
* Improve disconnection modal messages (#7612)
* Improve disconnectAccountModalDescription and disconnectAllModalDescription messages
* Update disconnectAccountModalDescription app/_locales/en/messages.json
Co-Authored-By: Mark Stacey <markjstacey@gmail.com>
* Improve disconnectAccount modal message clarity
* Adds cancel button to the account selection screen of the permissions request flow (#7613)
* Fix eth_accounts permission language & selectability (#7614)
* fix eth_accounts language & selectability
* fix MetaMask capitalization in all messages
* Close sidebar when opening connected sites (#7611)
The 'Connected Sites' button in the accounts details now closes the
sidebar, if it is open. This was accomplished by pulling the click
handler for that button up to the wallet view component, where another
button already followed a similar pattern of closing the sidebar.
It seemed confusing to me that one handler was in the `AccountsDetails`
container component, and one was handed down from above, so I added
PropTypes to the container component.
I'm not sure that the WalletView component is the best place for this
logic, but I've put it there for now to be consistent with the add
token button.
* Reject permissions request upon tab close (#7618)
Permissions requests are now rejected when the page is closed. This
only applies to the full-screen view, as that is the view permission
requests should be handled in. The case where the user deals with the
request through a different view is handled in #7617
* Handle tab update failure (#7619)
`extension.tabs.update` can sometimes fail if the user interacts with
the tabs directly around the same time. The redirect flow has been
updated to ensure that the permissions tab is still closed in that
case. The user is on their own to find the dapp tab again in that case.
* Login per site tab popup fixes (#7617)
* Handle redirect in response to state update in permissions-connect
* Ensure origin is available to permissions-connect subcomponents during redirect
* Hide app bar whenever on redirect route
* Improvements to handling of redirects in permissions-connect
* Ensure permission request id change handling only happens when page is not null
* Lint fix
* Decouple confirm transaction screen from the selected address (#7622)
* Avoid race condtion that could prevent contextual account switching (#7623)
There was a race condition in the logic responsible for switching the
selected account based upon the active tab. It was asynchronously
querying the active tab, then assuming it had been retrieved later.
The active tab info itself was already in the redux store in another
spot, one that is guaranteed to be set before the UI renders. The
race condition was avoided by deleting the duplicate state, and using
the other active tab state.
* Only redirect back to dapp if current tab is active (#7621)
The "redirect back to dapp" behaviour can be disruptive when the
permissions connect tab is not active. The purpose of the redirect was
to maintain context between the dapp and the permissions request, but
if the user has already moved to another tab, that no longer applies.
* Fix JSX style lint errors
* Remove unused state
2019-12-03 18:35:56 +01:00
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getCurrentAccountWithSendEtherInfo(state) {
|
2021-02-04 19:15:23 +01:00
|
|
|
const currentAddress = getSelectedAddress(state);
|
|
|
|
const accounts = accountsWithSendEtherInfoSelector(state);
|
2017-10-13 22:19:22 +02:00
|
|
|
|
2021-02-04 19:15:23 +01:00
|
|
|
return getAccountByAddress(accounts, currentAddress);
|
2020-03-06 22:34:56 +01:00
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getTargetAccountWithSendEtherInfo(state, targetAddress) {
|
2021-02-04 19:15:23 +01:00
|
|
|
const accounts = accountsWithSendEtherInfoSelector(state);
|
|
|
|
return getAccountByAddress(accounts, targetAddress);
|
2017-10-13 22:19:22 +02:00
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getCurrentEthBalance(state) {
|
2022-09-19 19:40:30 +02:00
|
|
|
return getCurrentAccountWithSendEtherInfo(state)?.balance;
|
2018-10-26 07:50:36 +02:00
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getGasIsLoading(state) {
|
2021-02-04 19:15:23 +01:00
|
|
|
return state.appState.gasIsLoading;
|
2018-06-19 17:53:33 +02:00
|
|
|
}
|
|
|
|
|
2022-01-06 03:47:26 +01:00
|
|
|
export function getAppIsLoading(state) {
|
|
|
|
return state.appState.isLoading;
|
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getCurrentCurrency(state) {
|
2021-02-04 19:15:23 +01:00
|
|
|
return state.metamask.currentCurrency;
|
2017-10-19 04:09:26 +02:00
|
|
|
}
|
2017-10-22 22:14:03 +02:00
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getTotalUnapprovedCount(state) {
|
2023-06-05 22:13:22 +02:00
|
|
|
return state.metamask.pendingApprovalCount ?? 0;
|
2020-04-20 19:21:57 +02:00
|
|
|
}
|
|
|
|
|
2022-05-16 20:36:19 +02:00
|
|
|
export function getTotalUnapprovedMessagesCount(state) {
|
|
|
|
const {
|
|
|
|
unapprovedMsgCount = 0,
|
|
|
|
unapprovedPersonalMsgCount = 0,
|
|
|
|
unapprovedDecryptMsgCount = 0,
|
|
|
|
unapprovedEncryptionPublicKeyMsgCount = 0,
|
|
|
|
unapprovedTypedMessagesCount = 0,
|
|
|
|
} = state.metamask;
|
|
|
|
|
|
|
|
return (
|
|
|
|
unapprovedMsgCount +
|
|
|
|
unapprovedPersonalMsgCount +
|
|
|
|
unapprovedDecryptMsgCount +
|
|
|
|
unapprovedEncryptionPublicKeyMsgCount +
|
|
|
|
unapprovedTypedMessagesCount
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2023-02-01 06:54:18 +01:00
|
|
|
export function getTotalUnapprovedSignatureRequestCount(state) {
|
|
|
|
const {
|
|
|
|
unapprovedMsgCount = 0,
|
|
|
|
unapprovedPersonalMsgCount = 0,
|
|
|
|
unapprovedTypedMessagesCount = 0,
|
|
|
|
} = state.metamask;
|
|
|
|
|
|
|
|
return (
|
|
|
|
unapprovedMsgCount +
|
|
|
|
unapprovedPersonalMsgCount +
|
|
|
|
unapprovedTypedMessagesCount
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2022-12-13 13:33:35 +01:00
|
|
|
export function getUnapprovedTxCount(state) {
|
2021-02-04 19:15:23 +01:00
|
|
|
const { unapprovedTxs = {} } = state.metamask;
|
|
|
|
return Object.keys(unapprovedTxs).length;
|
2020-04-20 19:21:57 +02:00
|
|
|
}
|
|
|
|
|
2021-02-22 17:20:42 +01:00
|
|
|
export function getUnapprovedConfirmations(state) {
|
2023-06-15 22:18:12 +02:00
|
|
|
const { pendingApprovals = {} } = state.metamask;
|
2021-02-22 17:20:42 +01:00
|
|
|
return Object.values(pendingApprovals);
|
|
|
|
}
|
|
|
|
|
2021-03-23 22:12:32 +01:00
|
|
|
export function getUnapprovedTemplatedConfirmations(state) {
|
|
|
|
const unapprovedConfirmations = getUnapprovedConfirmations(state);
|
|
|
|
return unapprovedConfirmations.filter((approval) =>
|
2023-05-10 07:36:01 +02:00
|
|
|
TEMPLATED_CONFIRMATION_APPROVAL_TYPES.includes(approval.type),
|
2021-03-23 22:12:32 +01:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2023-06-15 22:18:12 +02:00
|
|
|
export function getSuggestedTokens(state) {
|
|
|
|
return (
|
|
|
|
getUnapprovedConfirmations(state)?.filter(({ type, requestData }) => {
|
|
|
|
return (
|
|
|
|
type === ApprovalType.WatchAsset &&
|
|
|
|
requestData?.asset?.tokenId === undefined
|
|
|
|
);
|
|
|
|
}) || []
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
export function getSuggestedNfts(state) {
|
|
|
|
return (
|
|
|
|
getUnapprovedConfirmations(state)?.filter(({ requestData, type }) => {
|
|
|
|
return (
|
|
|
|
type === ApprovalType.WatchAsset &&
|
2023-06-28 20:01:38 +02:00
|
|
|
requestData?.asset?.tokenId !== undefined
|
2023-06-15 22:18:12 +02:00
|
|
|
);
|
|
|
|
}) || []
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getIsMainnet(state) {
|
2021-02-23 17:27:32 +01:00
|
|
|
const chainId = getCurrentChainId(state);
|
2022-09-14 16:55:31 +02:00
|
|
|
return chainId === CHAIN_IDS.MAINNET;
|
2019-02-26 19:30:41 +01:00
|
|
|
}
|
|
|
|
|
2021-02-16 16:31:16 +01:00
|
|
|
export function getIsTestnet(state) {
|
|
|
|
const chainId = getCurrentChainId(state);
|
|
|
|
return TEST_CHAINS.includes(chainId);
|
|
|
|
}
|
|
|
|
|
2021-07-01 03:54:47 +02:00
|
|
|
export function getIsNonStandardEthChain(state) {
|
|
|
|
return !(getIsMainnet(state) || getIsTestnet(state) || process.env.IN_TEST);
|
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getPreferences({ metamask }) {
|
2021-02-04 19:15:23 +01:00
|
|
|
return metamask.preferences;
|
2018-10-17 01:03:29 +02:00
|
|
|
}
|
2019-02-06 01:24:28 +01:00
|
|
|
|
2021-10-28 21:31:05 +02:00
|
|
|
export function getShowTestNetworks(state) {
|
|
|
|
const { showTestNetworks } = getPreferences(state);
|
|
|
|
return Boolean(showTestNetworks);
|
|
|
|
}
|
|
|
|
|
2023-07-17 18:43:26 +02:00
|
|
|
export function getTestNetworkBackgroundColor(state) {
|
|
|
|
const currentNetwork = state.metamask.providerConfig.ticker;
|
|
|
|
switch (true) {
|
|
|
|
case currentNetwork?.includes(GOERLI_DISPLAY_NAME):
|
|
|
|
return BackgroundColor.goerli;
|
|
|
|
case currentNetwork?.includes(SEPOLIA_DISPLAY_NAME):
|
|
|
|
return BackgroundColor.sepolia;
|
|
|
|
default:
|
|
|
|
return undefined;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-05-04 13:14:07 +02:00
|
|
|
export function getDisabledRpcMethodPreferences(state) {
|
|
|
|
return state.metamask.disabledRpcMethodPreferences;
|
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getShouldShowFiat(state) {
|
2021-02-04 19:15:23 +01:00
|
|
|
const isMainNet = getIsMainnet(state);
|
2022-10-11 16:56:15 +02:00
|
|
|
const isCustomNetwork = getIsCustomNetwork(state);
|
2021-06-24 01:28:49 +02:00
|
|
|
const conversionRate = getConversionRate(state);
|
2023-01-17 16:23:04 +01:00
|
|
|
const useCurrencyRateCheck = getUseCurrencyRateCheck(state);
|
2021-02-04 19:15:23 +01:00
|
|
|
const { showFiatInTestnets } = getPreferences(state);
|
2022-10-11 16:56:15 +02:00
|
|
|
return Boolean(
|
2023-01-17 16:23:04 +01:00
|
|
|
(isMainNet || isCustomNetwork || showFiatInTestnets) &&
|
|
|
|
useCurrencyRateCheck &&
|
|
|
|
conversionRate,
|
2022-10-11 16:56:15 +02:00
|
|
|
);
|
2020-05-12 21:07:35 +02:00
|
|
|
}
|
|
|
|
|
2021-03-09 20:35:55 +01:00
|
|
|
export function getShouldHideZeroBalanceTokens(state) {
|
|
|
|
const { hideZeroBalanceTokens } = getPreferences(state);
|
|
|
|
return hideZeroBalanceTokens;
|
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getAdvancedInlineGasShown(state) {
|
2021-02-04 19:15:23 +01:00
|
|
|
return Boolean(state.metamask.featureFlags.advancedInlineGas);
|
2019-02-06 01:24:28 +01:00
|
|
|
}
|
2019-04-29 08:18:40 +02:00
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getUseNonceField(state) {
|
2021-02-04 19:15:23 +01:00
|
|
|
return Boolean(state.metamask.useNonceField);
|
2019-09-27 06:30:36 +02:00
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getCustomNonceValue(state) {
|
2021-02-04 19:15:23 +01:00
|
|
|
return String(state.metamask.customNonceValue);
|
2019-09-27 06:30:36 +02:00
|
|
|
}
|
|
|
|
|
Permission System 2.0 (#12243)
# Permission System 2.0
## Background
This PR migrates the extension permission system to [the new `PermissionController`](https://github.com/MetaMask/snaps-skunkworks/tree/main/packages/controllers/src/permissions).
The original permission system, based on [`rpc-cap`](https://github.com/MetaMask/rpc-cap), introduced [`ZCAP-LD`](https://w3c-ccg.github.io/zcap-ld/)-like permissions to our JSON-RPC stack.
We used it to [implement](https://github.com/MetaMask/metamask-extension/pull/7004) what we called "LoginPerSite" in [version 7.7.0](https://github.com/MetaMask/metamask-extension/releases/tag/v7.7.0) of the extension, which enabled the user to choose which accounts, if any, should be exposed to each dapp.
While that was a worthwhile feature in and of itself, we wanted a permission _system_ in order to enable everything we are going to with Snaps.
Unfortunately, the original permission system was difficult to use, and necessitated the creation of the original `PermissionsController` (note the "s"), which was more or less a wrapper for `rpc-cap`.
With this PR, we shake off the yoke of the original permission system, in favor of the modular, self-contained, ergonomic, and more mature permission system 2.0.
Note that [the `PermissionController` readme](https://github.com/MetaMask/snaps-skunkworks/tree/main/packages/controllers/src/permissions/README.md) explains how the new permission system works.
The `PermissionController` and `SubjectMetadataController` are currently shipped via `@metamask/snap-controllers`. This is a temporary state of affairs, and we'll move them to `@metamask/controllers` once they've landed in prod.
## Changes in Detail
First, the changes in this PR are not as big as they seem. Roughly half of the additions in this PR are fixtures in the test for the new migration (number 68), and a significant portion of the remaining ~2500 lines are due to find-and-replace changes in other test fixtures and UI files.
- The extension `PermissionsController` has been deleted, and completely replaced with the new `PermissionController` from [`@metamask/snap-controllers`](https://www.npmjs.com/package/@metamask/snap-controllers).
- The original `PermissionsController` "domain metadata" functionality is now managed by the new `SubjectMetadataController`, also from [`@metamask/snap-controllers`](https://www.npmjs.com/package/@metamask/snap-controllers).
- The permission activity and history log controller has been renamed `PermissionLogController` and has its own top-level state key, but is otherwise functionally equivalent to the existing implementation.
- Migration number 68 has been added to account for the new state changes.
- The tests in `app/scripts/controllers/permissions` have been migrated from `mocha` to `jest`.
Reviewers should focus their attention on the following files:
- `app/scripts/`
- `metamask-controller.js`
- This is where most of the integration work for the new `PermissionController` occurs.
Some functions that were internal to the original controller were moved here.
- `controllers/permissions/`
- `selectors.js`
- These selectors are for `ControllerMessenger` selector subscriptions. The actual subscriptions occur in `metamask-controller.js`. See the `ControllerMessenger` implementation for details.
- `specifications.js`
- The caveat and permission specifications are required by the new `PermissionController`, and are used to specify the `eth_accounts` permission and its JSON-RPC method implementation.
See the `PermissionController` readme for details.
- `migrations/068.js`
- The new state should be cross-referenced with the controllers that manage it.
The accompanying tests should also be thoroughly reviewed.
Some files may appear new but have just moved and/or been renamed:
- `app/scripts/lib/rpc-method-middleware/handlers/request-accounts.js`
- This was previously implemented in `controllers/permissions/permissionsMethodMiddleware.js`.
- `test/mocks/permissions.js`
- A truncated version of `test/mocks/permission-controller.js`.
Co-authored-by: Mark Stacey <markjstacey@gmail.com>
2021-12-07 04:16:49 +01:00
|
|
|
export function getSubjectMetadata(state) {
|
|
|
|
return state.metamask.subjectMetadata;
|
Connect distinct accounts per site (#7004)
* add PermissionsController
remove provider approval controller
integrate rpc-cap
create PermissionsController
move provider approval functionality to permissions controller
add permissions approval ui, settings page
add permissions activity and history
move some functionality to metamask-inpage-provider
rename siteMetadata -> domainMetadata
add accountsChange notification to inpage provider
move functionality to inpage provider
update inpage provider
Remove 'Connections' settings page (#7369)
add hooks for exposing accounts in settings
rename unused messages in non-English locales
Add external extension id to metadata (#7396)
update inpage provider, rpc-cap
add eth_requestAccounts handling to background
prevent notifying connections if extension is locked
update inpage provider
Fix lint errors
add migration
review fixes
transaction controller review updates
removed unused messages
* Login Per Site UI (#7368)
* LoginPerSite original UI changes to keep
* First commit
* Get necessary connected tab info for redirect and icon display for permissioned sites
* Fix up designs and add missing features
* Some lint fixes
* More lint fixes
* Ensures the tx controller + tx-state-manager orders transactions in the order they are received
* Code cleanup for LoginPerSite-ui
* Update e2e tests to use new connection flow
* Fix display of connect screen and app header after login when connect request present
* Update metamask-responsive-ui.spec for new item in accounts dropdown
* Fix approve container by replacing approvedOrigins with domainMetaData
* Adds test/e2e/permissions.spec.js
* Correctly handle cancellation of a permissions request
* Redirect to home after disconnecting all sites / cancelling all permissions
* Fix display of site icons in menu
* Fix height of permissions page container
* Remove unused locale messages
* Set default values for openExternalTabs and tabIdOrigins in account-menu.container
* More code cleanup for LoginPerSite-ui
* Use extensions api to close tab in permissions-connect
* Remove unnecessary change in domIsReady() in contentscript
* Remove unnecessary private function markers and class methods (for background tab info) in metamask-controller.
* Adds getOriginOfCurrentTab selector
* Adds IconWithFallback component and substitutes for appropriate cases
* Add and utilize font mixins
* Remove unused method in disconnect-all.container.js
* Simplify buttonSizeLarge code in page-container-footer.component.js
* Add and utilize getAccountsWithLabels selector
* Remove console.log in ui/app/store/actions.js
* Change last connected time format to yyyy-M-d
* Fix css associated with IconWithFallback change
* Ensure tracked openNonMetamaskTabsIDs are correctly set to inactive on tab changes
* Code cleanup for LoginPerSite-ui
* Use reusable function for modifying openNonMetamaskTabsIDs in background.js
* Enables automatic switching to connected account when connected domain is open
* Prevent exploit of tabIdOriginMap in background.js
* Remove unneeded code from contentscript.js
* Simplify current tab origin and window opener logic using remotePort listener tabs.queryTabs
* Design and styling fixes for LoginPerSite-ui
* Fix permissionHistory and permission logging for eth_requestAccounts and eth_accounts
* Front end changes to support display of lastConnected time in connected and permissions screens
* Fix lint errors
* Refactor structure of permissionsHistory
* Fix default values and object modifications for domain and permissionsHistory related data
* Fix connecting to new accounts from modal
* Replace retweet.svg with connect-white.svg
* Fix signature-request.spec
* Update metamask-inpage-provider version
* Fix permissions e2e tests
* Remove unneeded delay from test/e2e/signature-request.spec.js
* Add delay before attempting to retrieve network id in dapp in ethereum-on=.spec
* Use requestAccountTabIds strategy for determining tab id that opened a given window
* Improve default values for permissions requests
* Add some message descriptions to app/_locales/en/messages.json
* Code clean up in permission controller
* Stopped deep cloning object in mapObjectValues
* Bump metamask-inpage-provider version
* Add missing description in app/_locales/en/messages.json
* Return promises from queryTabs and switchToTab of extension.js
* Remove unused getAllPermissions function
* Use default props in icon-with-fallback.component.js
* Stop passing to permissions controller
* Delete no longer used clear-approved-origins modal code
* Remove duplicate imports in ui/app/components/app/index.scss
* Use URL instead of regex in getOriginFromUrl()
* Add runtime error checking to platform, promise based extension.tab methods
* Support permission requests from external extensions
* Improve font size and colour of the domain origin on the permission confirmation screen
* Add support for toggling permissions
* Ensure getRenderablePermissionsDomains only returns domains with exposedAccount caveat permissions
* Remove unused code from LoginPerSite-ui branch
* Ensure modal closes on Enter press for new-account-modal.component.js
* Lint fix
* fixup! Login Per Site UI (#7368)
* Some code cleanup for LoginPerSite
* Adds UX for connecting to dapps via the connected sites screen (#7593)
* Adds UX for connecting to dapps via the connected sites screen
* Use openMetaMaskTabIds from background.js to determine if current active tab is MetaMask
* Delete unused permissions controller methods
* Fixes two small bugs in the LoginPerSite ui (#7595)
* Restore `providerRequest` message translations (#7600)
This message was removed, but it was replaced with a very similar
message called `likeToConnect`. The only difference is that the new
message has "MetaMask" in it. Preserving these messages without
"MetaMask" is probably better than deleting them, so these messages
have all been restored and renamed to `likeToConnect`.
* Login per site no sitemetadata fix (#7610)
* Support connected sites for which we have no site metadata.
* Change property containing subtitle info often populated by origin to a more accurate of purpose name
* Lint fix
* Improve disconnection modal messages (#7612)
* Improve disconnectAccountModalDescription and disconnectAllModalDescription messages
* Update disconnectAccountModalDescription app/_locales/en/messages.json
Co-Authored-By: Mark Stacey <markjstacey@gmail.com>
* Improve disconnectAccount modal message clarity
* Adds cancel button to the account selection screen of the permissions request flow (#7613)
* Fix eth_accounts permission language & selectability (#7614)
* fix eth_accounts language & selectability
* fix MetaMask capitalization in all messages
* Close sidebar when opening connected sites (#7611)
The 'Connected Sites' button in the accounts details now closes the
sidebar, if it is open. This was accomplished by pulling the click
handler for that button up to the wallet view component, where another
button already followed a similar pattern of closing the sidebar.
It seemed confusing to me that one handler was in the `AccountsDetails`
container component, and one was handed down from above, so I added
PropTypes to the container component.
I'm not sure that the WalletView component is the best place for this
logic, but I've put it there for now to be consistent with the add
token button.
* Reject permissions request upon tab close (#7618)
Permissions requests are now rejected when the page is closed. This
only applies to the full-screen view, as that is the view permission
requests should be handled in. The case where the user deals with the
request through a different view is handled in #7617
* Handle tab update failure (#7619)
`extension.tabs.update` can sometimes fail if the user interacts with
the tabs directly around the same time. The redirect flow has been
updated to ensure that the permissions tab is still closed in that
case. The user is on their own to find the dapp tab again in that case.
* Login per site tab popup fixes (#7617)
* Handle redirect in response to state update in permissions-connect
* Ensure origin is available to permissions-connect subcomponents during redirect
* Hide app bar whenever on redirect route
* Improvements to handling of redirects in permissions-connect
* Ensure permission request id change handling only happens when page is not null
* Lint fix
* Decouple confirm transaction screen from the selected address (#7622)
* Avoid race condtion that could prevent contextual account switching (#7623)
There was a race condition in the logic responsible for switching the
selected account based upon the active tab. It was asynchronously
querying the active tab, then assuming it had been retrieved later.
The active tab info itself was already in the redux store in another
spot, one that is guaranteed to be set before the UI renders. The
race condition was avoided by deleting the duplicate state, and using
the other active tab state.
* Only redirect back to dapp if current tab is active (#7621)
The "redirect back to dapp" behaviour can be disruptive when the
permissions connect tab is not active. The purpose of the redirect was
to maintain context between the dapp and the permissions request, but
if the user has already moved to another tab, that no longer applies.
* Fix JSX style lint errors
* Remove unused state
2019-12-03 18:35:56 +01:00
|
|
|
}
|
|
|
|
|
2023-04-25 16:32:51 +02:00
|
|
|
///: BEGIN:ONLY_INCLUDE_IN(snaps)
|
2022-02-15 01:02:51 +01:00
|
|
|
/**
|
|
|
|
* @param {string} svgString - The raw SVG string to make embeddable.
|
|
|
|
* @returns {string} The embeddable SVG string.
|
|
|
|
*/
|
|
|
|
const getEmbeddableSvg = memoize(
|
|
|
|
(svgString) => `data:image/svg+xml;utf8,${encodeURIComponent(svgString)}`,
|
|
|
|
);
|
|
|
|
///: END:ONLY_INCLUDE_IN
|
|
|
|
|
|
|
|
export function getTargetSubjectMetadata(state, origin) {
|
|
|
|
const metadata = getSubjectMetadata(state)[origin];
|
|
|
|
|
2023-04-25 16:32:51 +02:00
|
|
|
///: BEGIN:ONLY_INCLUDE_IN(snaps)
|
2023-01-24 16:03:01 +01:00
|
|
|
if (metadata?.subjectType === SubjectType.Snap) {
|
2022-02-15 01:02:51 +01:00
|
|
|
const { svgIcon, ...remainingMetadata } = metadata;
|
|
|
|
return {
|
|
|
|
...remainingMetadata,
|
|
|
|
iconUrl: svgIcon ? getEmbeddableSvg(svgIcon) : null,
|
|
|
|
};
|
|
|
|
}
|
|
|
|
///: END:ONLY_INCLUDE_IN
|
|
|
|
return metadata;
|
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getRpcPrefsForCurrentProvider(state) {
|
2023-05-02 14:36:24 +02:00
|
|
|
const { rpcPrefs } = getProviderConfig(state);
|
|
|
|
return rpcPrefs || {};
|
2019-05-09 19:27:14 +02:00
|
|
|
}
|
2019-06-18 14:17:14 +02:00
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getKnownMethodData(state, data) {
|
2019-06-18 14:17:14 +02:00
|
|
|
if (!data) {
|
2021-02-04 19:15:23 +01:00
|
|
|
return null;
|
2019-06-18 14:17:14 +02:00
|
|
|
}
|
2021-02-04 19:15:23 +01:00
|
|
|
const prefixedData = addHexPrefix(data);
|
|
|
|
const fourBytePrefix = prefixedData.slice(0, 10);
|
|
|
|
const { knownMethodData } = state.metamask;
|
2019-06-18 14:17:14 +02:00
|
|
|
|
2021-02-04 19:15:23 +01:00
|
|
|
return knownMethodData && knownMethodData[fourBytePrefix];
|
2019-06-18 14:17:14 +02:00
|
|
|
}
|
2019-09-16 19:11:01 +02:00
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getFeatureFlags(state) {
|
2021-02-04 19:15:23 +01:00
|
|
|
return state.metamask.featureFlags;
|
2019-09-16 19:11:01 +02:00
|
|
|
}
|
Connect distinct accounts per site (#7004)
* add PermissionsController
remove provider approval controller
integrate rpc-cap
create PermissionsController
move provider approval functionality to permissions controller
add permissions approval ui, settings page
add permissions activity and history
move some functionality to metamask-inpage-provider
rename siteMetadata -> domainMetadata
add accountsChange notification to inpage provider
move functionality to inpage provider
update inpage provider
Remove 'Connections' settings page (#7369)
add hooks for exposing accounts in settings
rename unused messages in non-English locales
Add external extension id to metadata (#7396)
update inpage provider, rpc-cap
add eth_requestAccounts handling to background
prevent notifying connections if extension is locked
update inpage provider
Fix lint errors
add migration
review fixes
transaction controller review updates
removed unused messages
* Login Per Site UI (#7368)
* LoginPerSite original UI changes to keep
* First commit
* Get necessary connected tab info for redirect and icon display for permissioned sites
* Fix up designs and add missing features
* Some lint fixes
* More lint fixes
* Ensures the tx controller + tx-state-manager orders transactions in the order they are received
* Code cleanup for LoginPerSite-ui
* Update e2e tests to use new connection flow
* Fix display of connect screen and app header after login when connect request present
* Update metamask-responsive-ui.spec for new item in accounts dropdown
* Fix approve container by replacing approvedOrigins with domainMetaData
* Adds test/e2e/permissions.spec.js
* Correctly handle cancellation of a permissions request
* Redirect to home after disconnecting all sites / cancelling all permissions
* Fix display of site icons in menu
* Fix height of permissions page container
* Remove unused locale messages
* Set default values for openExternalTabs and tabIdOrigins in account-menu.container
* More code cleanup for LoginPerSite-ui
* Use extensions api to close tab in permissions-connect
* Remove unnecessary change in domIsReady() in contentscript
* Remove unnecessary private function markers and class methods (for background tab info) in metamask-controller.
* Adds getOriginOfCurrentTab selector
* Adds IconWithFallback component and substitutes for appropriate cases
* Add and utilize font mixins
* Remove unused method in disconnect-all.container.js
* Simplify buttonSizeLarge code in page-container-footer.component.js
* Add and utilize getAccountsWithLabels selector
* Remove console.log in ui/app/store/actions.js
* Change last connected time format to yyyy-M-d
* Fix css associated with IconWithFallback change
* Ensure tracked openNonMetamaskTabsIDs are correctly set to inactive on tab changes
* Code cleanup for LoginPerSite-ui
* Use reusable function for modifying openNonMetamaskTabsIDs in background.js
* Enables automatic switching to connected account when connected domain is open
* Prevent exploit of tabIdOriginMap in background.js
* Remove unneeded code from contentscript.js
* Simplify current tab origin and window opener logic using remotePort listener tabs.queryTabs
* Design and styling fixes for LoginPerSite-ui
* Fix permissionHistory and permission logging for eth_requestAccounts and eth_accounts
* Front end changes to support display of lastConnected time in connected and permissions screens
* Fix lint errors
* Refactor structure of permissionsHistory
* Fix default values and object modifications for domain and permissionsHistory related data
* Fix connecting to new accounts from modal
* Replace retweet.svg with connect-white.svg
* Fix signature-request.spec
* Update metamask-inpage-provider version
* Fix permissions e2e tests
* Remove unneeded delay from test/e2e/signature-request.spec.js
* Add delay before attempting to retrieve network id in dapp in ethereum-on=.spec
* Use requestAccountTabIds strategy for determining tab id that opened a given window
* Improve default values for permissions requests
* Add some message descriptions to app/_locales/en/messages.json
* Code clean up in permission controller
* Stopped deep cloning object in mapObjectValues
* Bump metamask-inpage-provider version
* Add missing description in app/_locales/en/messages.json
* Return promises from queryTabs and switchToTab of extension.js
* Remove unused getAllPermissions function
* Use default props in icon-with-fallback.component.js
* Stop passing to permissions controller
* Delete no longer used clear-approved-origins modal code
* Remove duplicate imports in ui/app/components/app/index.scss
* Use URL instead of regex in getOriginFromUrl()
* Add runtime error checking to platform, promise based extension.tab methods
* Support permission requests from external extensions
* Improve font size and colour of the domain origin on the permission confirmation screen
* Add support for toggling permissions
* Ensure getRenderablePermissionsDomains only returns domains with exposedAccount caveat permissions
* Remove unused code from LoginPerSite-ui branch
* Ensure modal closes on Enter press for new-account-modal.component.js
* Lint fix
* fixup! Login Per Site UI (#7368)
* Some code cleanup for LoginPerSite
* Adds UX for connecting to dapps via the connected sites screen (#7593)
* Adds UX for connecting to dapps via the connected sites screen
* Use openMetaMaskTabIds from background.js to determine if current active tab is MetaMask
* Delete unused permissions controller methods
* Fixes two small bugs in the LoginPerSite ui (#7595)
* Restore `providerRequest` message translations (#7600)
This message was removed, but it was replaced with a very similar
message called `likeToConnect`. The only difference is that the new
message has "MetaMask" in it. Preserving these messages without
"MetaMask" is probably better than deleting them, so these messages
have all been restored and renamed to `likeToConnect`.
* Login per site no sitemetadata fix (#7610)
* Support connected sites for which we have no site metadata.
* Change property containing subtitle info often populated by origin to a more accurate of purpose name
* Lint fix
* Improve disconnection modal messages (#7612)
* Improve disconnectAccountModalDescription and disconnectAllModalDescription messages
* Update disconnectAccountModalDescription app/_locales/en/messages.json
Co-Authored-By: Mark Stacey <markjstacey@gmail.com>
* Improve disconnectAccount modal message clarity
* Adds cancel button to the account selection screen of the permissions request flow (#7613)
* Fix eth_accounts permission language & selectability (#7614)
* fix eth_accounts language & selectability
* fix MetaMask capitalization in all messages
* Close sidebar when opening connected sites (#7611)
The 'Connected Sites' button in the accounts details now closes the
sidebar, if it is open. This was accomplished by pulling the click
handler for that button up to the wallet view component, where another
button already followed a similar pattern of closing the sidebar.
It seemed confusing to me that one handler was in the `AccountsDetails`
container component, and one was handed down from above, so I added
PropTypes to the container component.
I'm not sure that the WalletView component is the best place for this
logic, but I've put it there for now to be consistent with the add
token button.
* Reject permissions request upon tab close (#7618)
Permissions requests are now rejected when the page is closed. This
only applies to the full-screen view, as that is the view permission
requests should be handled in. The case where the user deals with the
request through a different view is handled in #7617
* Handle tab update failure (#7619)
`extension.tabs.update` can sometimes fail if the user interacts with
the tabs directly around the same time. The redirect flow has been
updated to ensure that the permissions tab is still closed in that
case. The user is on their own to find the dapp tab again in that case.
* Login per site tab popup fixes (#7617)
* Handle redirect in response to state update in permissions-connect
* Ensure origin is available to permissions-connect subcomponents during redirect
* Hide app bar whenever on redirect route
* Improvements to handling of redirects in permissions-connect
* Ensure permission request id change handling only happens when page is not null
* Lint fix
* Decouple confirm transaction screen from the selected address (#7622)
* Avoid race condtion that could prevent contextual account switching (#7623)
There was a race condition in the logic responsible for switching the
selected account based upon the active tab. It was asynchronously
querying the active tab, then assuming it had been retrieved later.
The active tab info itself was already in the redux store in another
spot, one that is guaranteed to be set before the UI renders. The
race condition was avoided by deleting the duplicate state, and using
the other active tab state.
* Only redirect back to dapp if current tab is active (#7621)
The "redirect back to dapp" behaviour can be disruptive when the
permissions connect tab is not active. The purpose of the redirect was
to maintain context between the dapp and the permissions request, but
if the user has already moved to another tab, that no longer applies.
* Fix JSX style lint errors
* Remove unused state
2019-12-03 18:35:56 +01:00
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getOriginOfCurrentTab(state) {
|
2021-02-04 19:15:23 +01:00
|
|
|
return state.activeTab.origin;
|
Connect distinct accounts per site (#7004)
* add PermissionsController
remove provider approval controller
integrate rpc-cap
create PermissionsController
move provider approval functionality to permissions controller
add permissions approval ui, settings page
add permissions activity and history
move some functionality to metamask-inpage-provider
rename siteMetadata -> domainMetadata
add accountsChange notification to inpage provider
move functionality to inpage provider
update inpage provider
Remove 'Connections' settings page (#7369)
add hooks for exposing accounts in settings
rename unused messages in non-English locales
Add external extension id to metadata (#7396)
update inpage provider, rpc-cap
add eth_requestAccounts handling to background
prevent notifying connections if extension is locked
update inpage provider
Fix lint errors
add migration
review fixes
transaction controller review updates
removed unused messages
* Login Per Site UI (#7368)
* LoginPerSite original UI changes to keep
* First commit
* Get necessary connected tab info for redirect and icon display for permissioned sites
* Fix up designs and add missing features
* Some lint fixes
* More lint fixes
* Ensures the tx controller + tx-state-manager orders transactions in the order they are received
* Code cleanup for LoginPerSite-ui
* Update e2e tests to use new connection flow
* Fix display of connect screen and app header after login when connect request present
* Update metamask-responsive-ui.spec for new item in accounts dropdown
* Fix approve container by replacing approvedOrigins with domainMetaData
* Adds test/e2e/permissions.spec.js
* Correctly handle cancellation of a permissions request
* Redirect to home after disconnecting all sites / cancelling all permissions
* Fix display of site icons in menu
* Fix height of permissions page container
* Remove unused locale messages
* Set default values for openExternalTabs and tabIdOrigins in account-menu.container
* More code cleanup for LoginPerSite-ui
* Use extensions api to close tab in permissions-connect
* Remove unnecessary change in domIsReady() in contentscript
* Remove unnecessary private function markers and class methods (for background tab info) in metamask-controller.
* Adds getOriginOfCurrentTab selector
* Adds IconWithFallback component and substitutes for appropriate cases
* Add and utilize font mixins
* Remove unused method in disconnect-all.container.js
* Simplify buttonSizeLarge code in page-container-footer.component.js
* Add and utilize getAccountsWithLabels selector
* Remove console.log in ui/app/store/actions.js
* Change last connected time format to yyyy-M-d
* Fix css associated with IconWithFallback change
* Ensure tracked openNonMetamaskTabsIDs are correctly set to inactive on tab changes
* Code cleanup for LoginPerSite-ui
* Use reusable function for modifying openNonMetamaskTabsIDs in background.js
* Enables automatic switching to connected account when connected domain is open
* Prevent exploit of tabIdOriginMap in background.js
* Remove unneeded code from contentscript.js
* Simplify current tab origin and window opener logic using remotePort listener tabs.queryTabs
* Design and styling fixes for LoginPerSite-ui
* Fix permissionHistory and permission logging for eth_requestAccounts and eth_accounts
* Front end changes to support display of lastConnected time in connected and permissions screens
* Fix lint errors
* Refactor structure of permissionsHistory
* Fix default values and object modifications for domain and permissionsHistory related data
* Fix connecting to new accounts from modal
* Replace retweet.svg with connect-white.svg
* Fix signature-request.spec
* Update metamask-inpage-provider version
* Fix permissions e2e tests
* Remove unneeded delay from test/e2e/signature-request.spec.js
* Add delay before attempting to retrieve network id in dapp in ethereum-on=.spec
* Use requestAccountTabIds strategy for determining tab id that opened a given window
* Improve default values for permissions requests
* Add some message descriptions to app/_locales/en/messages.json
* Code clean up in permission controller
* Stopped deep cloning object in mapObjectValues
* Bump metamask-inpage-provider version
* Add missing description in app/_locales/en/messages.json
* Return promises from queryTabs and switchToTab of extension.js
* Remove unused getAllPermissions function
* Use default props in icon-with-fallback.component.js
* Stop passing to permissions controller
* Delete no longer used clear-approved-origins modal code
* Remove duplicate imports in ui/app/components/app/index.scss
* Use URL instead of regex in getOriginFromUrl()
* Add runtime error checking to platform, promise based extension.tab methods
* Support permission requests from external extensions
* Improve font size and colour of the domain origin on the permission confirmation screen
* Add support for toggling permissions
* Ensure getRenderablePermissionsDomains only returns domains with exposedAccount caveat permissions
* Remove unused code from LoginPerSite-ui branch
* Ensure modal closes on Enter press for new-account-modal.component.js
* Lint fix
* fixup! Login Per Site UI (#7368)
* Some code cleanup for LoginPerSite
* Adds UX for connecting to dapps via the connected sites screen (#7593)
* Adds UX for connecting to dapps via the connected sites screen
* Use openMetaMaskTabIds from background.js to determine if current active tab is MetaMask
* Delete unused permissions controller methods
* Fixes two small bugs in the LoginPerSite ui (#7595)
* Restore `providerRequest` message translations (#7600)
This message was removed, but it was replaced with a very similar
message called `likeToConnect`. The only difference is that the new
message has "MetaMask" in it. Preserving these messages without
"MetaMask" is probably better than deleting them, so these messages
have all been restored and renamed to `likeToConnect`.
* Login per site no sitemetadata fix (#7610)
* Support connected sites for which we have no site metadata.
* Change property containing subtitle info often populated by origin to a more accurate of purpose name
* Lint fix
* Improve disconnection modal messages (#7612)
* Improve disconnectAccountModalDescription and disconnectAllModalDescription messages
* Update disconnectAccountModalDescription app/_locales/en/messages.json
Co-Authored-By: Mark Stacey <markjstacey@gmail.com>
* Improve disconnectAccount modal message clarity
* Adds cancel button to the account selection screen of the permissions request flow (#7613)
* Fix eth_accounts permission language & selectability (#7614)
* fix eth_accounts language & selectability
* fix MetaMask capitalization in all messages
* Close sidebar when opening connected sites (#7611)
The 'Connected Sites' button in the accounts details now closes the
sidebar, if it is open. This was accomplished by pulling the click
handler for that button up to the wallet view component, where another
button already followed a similar pattern of closing the sidebar.
It seemed confusing to me that one handler was in the `AccountsDetails`
container component, and one was handed down from above, so I added
PropTypes to the container component.
I'm not sure that the WalletView component is the best place for this
logic, but I've put it there for now to be consistent with the add
token button.
* Reject permissions request upon tab close (#7618)
Permissions requests are now rejected when the page is closed. This
only applies to the full-screen view, as that is the view permission
requests should be handled in. The case where the user deals with the
request through a different view is handled in #7617
* Handle tab update failure (#7619)
`extension.tabs.update` can sometimes fail if the user interacts with
the tabs directly around the same time. The redirect flow has been
updated to ensure that the permissions tab is still closed in that
case. The user is on their own to find the dapp tab again in that case.
* Login per site tab popup fixes (#7617)
* Handle redirect in response to state update in permissions-connect
* Ensure origin is available to permissions-connect subcomponents during redirect
* Hide app bar whenever on redirect route
* Improvements to handling of redirects in permissions-connect
* Ensure permission request id change handling only happens when page is not null
* Lint fix
* Decouple confirm transaction screen from the selected address (#7622)
* Avoid race condtion that could prevent contextual account switching (#7623)
There was a race condition in the logic responsible for switching the
selected account based upon the active tab. It was asynchronously
querying the active tab, then assuming it had been retrieved later.
The active tab info itself was already in the redux store in another
spot, one that is guaranteed to be set before the UI renders. The
race condition was avoided by deleting the duplicate state, and using
the other active tab state.
* Only redirect back to dapp if current tab is active (#7621)
The "redirect back to dapp" behaviour can be disruptive when the
permissions connect tab is not active. The purpose of the redirect was
to maintain context between the dapp and the permissions request, but
if the user has already moved to another tab, that no longer applies.
* Fix JSX style lint errors
* Remove unused state
2019-12-03 18:35:56 +01:00
|
|
|
}
|
|
|
|
|
2020-11-03 00:41:28 +01:00
|
|
|
export function getIpfsGateway(state) {
|
2021-02-04 19:15:23 +01:00
|
|
|
return state.metamask.ipfsGateway;
|
2019-12-12 20:28:07 +01:00
|
|
|
}
|
2020-11-10 18:39:45 +01:00
|
|
|
|
2021-04-15 19:41:40 +02:00
|
|
|
export function getInfuraBlocked(state) {
|
|
|
|
return Boolean(state.metamask.infuraBlocked);
|
|
|
|
}
|
|
|
|
|
2020-11-10 18:39:45 +01:00
|
|
|
export function getUSDConversionRate(state) {
|
2021-02-04 19:15:23 +01:00
|
|
|
return state.metamask.usdConversionRate;
|
2020-11-10 18:39:45 +01:00
|
|
|
}
|
2020-12-11 00:40:29 +01:00
|
|
|
|
|
|
|
export function getWeb3ShimUsageStateForOrigin(state, origin) {
|
2021-02-04 19:15:23 +01:00
|
|
|
return state.metamask.web3ShimUsageOrigins[origin];
|
2020-12-11 00:40:29 +01:00
|
|
|
}
|
2021-03-04 18:16:01 +01:00
|
|
|
|
|
|
|
/**
|
2022-07-27 15:28:05 +02:00
|
|
|
* @typedef {object} SwapsEthToken
|
2021-03-04 18:16:01 +01:00
|
|
|
* @property {string} symbol - The symbol for ETH, namely "ETH"
|
|
|
|
* @property {string} name - The name of the ETH currency, "Ether"
|
|
|
|
* @property {string} address - A substitute address for the metaswap-api to
|
|
|
|
* recognize the ETH token
|
|
|
|
* @property {string} decimals - The number of ETH decimals, i.e. 18
|
|
|
|
* @property {string} balance - The user's ETH balance in decimal wei, with a
|
|
|
|
* precision of 4 decimal places
|
|
|
|
* @property {string} string - The user's ETH balance in decimal ETH
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Swaps related code uses token objects for various purposes. These objects
|
|
|
|
* always have the following properties: `symbol`, `name`, `address`, and
|
|
|
|
* `decimals`.
|
|
|
|
*
|
|
|
|
* When available for the current account, the objects can have `balance` and
|
|
|
|
* `string` properties.
|
|
|
|
* `balance` is the users token balance in decimal values, denominated in the
|
|
|
|
* minimal token units (according to its decimals).
|
|
|
|
* `string` is the token balance in a readable format, ready for rendering.
|
|
|
|
*
|
2021-03-18 11:20:06 +01:00
|
|
|
* Swaps treats the selected chain's currency as a token, and we use the token constants
|
|
|
|
* in the SWAPS_CHAINID_DEFAULT_TOKEN_MAP to set the standard properties for
|
|
|
|
* the token. The getSwapsDefaultToken selector extends that object with
|
|
|
|
* `balance` and `string` values of the same type as in regular ERC-20 token
|
|
|
|
* objects, per the above description.
|
2021-03-04 18:16:01 +01:00
|
|
|
*
|
|
|
|
* @param {object} state - the redux state object
|
|
|
|
* @returns {SwapsEthToken} The token object representation of the currently
|
|
|
|
* selected account's ETH balance, as expected by the Swaps API.
|
|
|
|
*/
|
|
|
|
|
2021-03-18 11:20:06 +01:00
|
|
|
export function getSwapsDefaultToken(state) {
|
2021-03-04 18:16:01 +01:00
|
|
|
const selectedAccount = getSelectedAccount(state);
|
|
|
|
const { balance } = selectedAccount;
|
2021-03-18 11:20:06 +01:00
|
|
|
const chainId = getCurrentChainId(state);
|
|
|
|
|
|
|
|
const defaultTokenObject = SWAPS_CHAINID_DEFAULT_TOKEN_MAP[chainId];
|
2021-03-04 18:16:01 +01:00
|
|
|
|
|
|
|
return {
|
2021-03-18 11:20:06 +01:00
|
|
|
...defaultTokenObject,
|
2021-03-04 18:16:01 +01:00
|
|
|
balance: hexToDecimal(balance),
|
|
|
|
string: getValueFromWeiHex({
|
|
|
|
value: balance,
|
|
|
|
numberOfDecimals: 4,
|
|
|
|
toDenomination: 'ETH',
|
|
|
|
}),
|
|
|
|
};
|
|
|
|
}
|
2021-03-18 11:20:06 +01:00
|
|
|
|
|
|
|
export function getIsSwapsChain(state) {
|
|
|
|
const chainId = getCurrentChainId(state);
|
2022-04-21 18:19:34 +02:00
|
|
|
const isNotDevelopment =
|
2022-05-09 18:48:14 +02:00
|
|
|
process.env.METAMASK_ENVIRONMENT !== 'development' &&
|
2022-04-21 18:19:34 +02:00
|
|
|
process.env.METAMASK_ENVIRONMENT !== 'testing';
|
|
|
|
return isNotDevelopment
|
2022-04-14 17:02:38 +02:00
|
|
|
? ALLOWED_PROD_SWAPS_CHAIN_IDS.includes(chainId)
|
|
|
|
: ALLOWED_DEV_SWAPS_CHAIN_IDS.includes(chainId);
|
2021-03-18 11:20:06 +01:00
|
|
|
}
|
2021-04-02 00:57:00 +02:00
|
|
|
|
2023-03-23 18:24:10 +01:00
|
|
|
export function getIsBridgeChain(state) {
|
|
|
|
const chainId = getCurrentChainId(state);
|
|
|
|
return ALLOWED_BRIDGE_CHAIN_IDS.includes(chainId);
|
|
|
|
}
|
|
|
|
|
2023-04-21 04:27:18 +02:00
|
|
|
export const getIsBridgeToken = (tokenAddress) => (state) => {
|
|
|
|
const chainId = getCurrentChainId(state);
|
|
|
|
const isBridgeChain = getIsBridgeChain(state);
|
|
|
|
return (
|
|
|
|
isBridgeChain &&
|
|
|
|
ALLOWED_BRIDGE_TOKEN_ADDRESSES[chainId].includes(tokenAddress.toLowerCase())
|
|
|
|
);
|
|
|
|
};
|
|
|
|
|
2022-01-28 14:46:26 +01:00
|
|
|
export function getIsBuyableChain(state) {
|
|
|
|
const chainId = getCurrentChainId(state);
|
|
|
|
return Object.keys(BUYABLE_CHAINS_MAP).includes(chainId);
|
|
|
|
}
|
2021-04-02 00:57:00 +02:00
|
|
|
export function getNativeCurrencyImage(state) {
|
2022-08-03 03:06:11 +02:00
|
|
|
const nativeCurrency = getNativeCurrency(state)?.toUpperCase();
|
2021-04-02 00:57:00 +02:00
|
|
|
return NATIVE_CURRENCY_TOKEN_IMAGE_MAP[nativeCurrency];
|
|
|
|
}
|
2021-04-17 00:00:18 +02:00
|
|
|
|
|
|
|
export function getNextSuggestedNonce(state) {
|
|
|
|
return Number(state.metamask.nextNonce);
|
|
|
|
}
|
2021-04-28 18:51:41 +02:00
|
|
|
|
|
|
|
export function getShowWhatsNewPopup(state) {
|
|
|
|
return state.appState.showWhatsNewPopup;
|
|
|
|
}
|
|
|
|
|
2022-10-28 10:37:33 +02:00
|
|
|
const createDeepEqualSelector = createSelectorCreator(defaultMemoize, isEqual);
|
|
|
|
|
2022-12-22 21:07:51 +01:00
|
|
|
export const getMemoizedMetaMaskIdentities = createDeepEqualSelector(
|
|
|
|
getMetaMaskIdentities,
|
|
|
|
(identities) => identities,
|
|
|
|
);
|
|
|
|
|
|
|
|
export const getMemoizedAddressBook = createDeepEqualSelector(
|
|
|
|
getAddressBook,
|
|
|
|
(addressBook) => addressBook,
|
|
|
|
);
|
|
|
|
|
|
|
|
export const getMemoizedMetadataContractName = createDeepEqualSelector(
|
|
|
|
getTokenList,
|
|
|
|
(_tokenList, address) => address,
|
|
|
|
(tokenList, address) => {
|
|
|
|
const entry = Object.values(tokenList).find((identity) =>
|
2023-02-27 17:33:21 +01:00
|
|
|
isEqualCaseInsensitive(identity.address, address),
|
2022-12-22 21:07:51 +01:00
|
|
|
);
|
|
|
|
return entry && entry.name !== '' ? entry.name : '';
|
|
|
|
},
|
|
|
|
);
|
|
|
|
|
2022-10-28 10:37:33 +02:00
|
|
|
export const getUnapprovedTransactions = (state) =>
|
|
|
|
state.metamask.unapprovedTxs;
|
|
|
|
|
2023-02-01 06:54:18 +01:00
|
|
|
export const getCurrentNetworkTransactionList = (state) =>
|
2022-11-04 17:14:43 +01:00
|
|
|
state.metamask.currentNetworkTxList;
|
|
|
|
|
2022-10-28 10:37:33 +02:00
|
|
|
export const getTxData = (state) => state.confirmTransaction.txData;
|
|
|
|
|
|
|
|
export const getUnapprovedTransaction = createDeepEqualSelector(
|
|
|
|
getUnapprovedTransactions,
|
|
|
|
(_, transactionId) => transactionId,
|
|
|
|
(unapprovedTxs, transactionId) => {
|
|
|
|
return (
|
|
|
|
Object.values(unapprovedTxs).find(({ id }) => id === transactionId) || {}
|
|
|
|
);
|
|
|
|
},
|
|
|
|
);
|
|
|
|
|
2022-11-04 17:14:43 +01:00
|
|
|
export const getTransaction = createDeepEqualSelector(
|
|
|
|
getCurrentNetworkTransactionList,
|
|
|
|
(_, transactionId) => transactionId,
|
|
|
|
(unapprovedTxs, transactionId) => {
|
|
|
|
return (
|
|
|
|
Object.values(unapprovedTxs).find(({ id }) => id === transactionId) || {}
|
|
|
|
);
|
|
|
|
},
|
|
|
|
);
|
|
|
|
|
2022-10-28 10:37:33 +02:00
|
|
|
export const getFullTxData = createDeepEqualSelector(
|
|
|
|
getTxData,
|
2022-11-04 17:14:43 +01:00
|
|
|
(state, transactionId, status) => {
|
2023-01-18 15:47:29 +01:00
|
|
|
if (status === TransactionStatus.unapproved) {
|
2022-11-04 17:14:43 +01:00
|
|
|
return getUnapprovedTransaction(state, transactionId);
|
|
|
|
}
|
|
|
|
return getTransaction(state, transactionId);
|
|
|
|
},
|
|
|
|
(_state, _transactionId, _status, customTxParamsData) => customTxParamsData,
|
2022-12-05 20:34:06 +01:00
|
|
|
(txData, transaction, customTxParamsData) => {
|
2022-10-28 10:37:33 +02:00
|
|
|
let fullTxData = { ...txData, ...transaction };
|
|
|
|
if (transaction && transaction.simulationFails) {
|
2023-04-26 02:13:38 +02:00
|
|
|
fullTxData.simulationFails = { ...transaction.simulationFails };
|
2022-10-28 10:37:33 +02:00
|
|
|
}
|
|
|
|
if (customTxParamsData) {
|
|
|
|
fullTxData = {
|
|
|
|
...fullTxData,
|
|
|
|
txParams: {
|
|
|
|
...fullTxData.txParams,
|
|
|
|
data: customTxParamsData,
|
|
|
|
},
|
|
|
|
};
|
|
|
|
}
|
|
|
|
return fullTxData;
|
|
|
|
},
|
|
|
|
);
|
|
|
|
|
2023-04-25 16:32:51 +02:00
|
|
|
///: BEGIN:ONLY_INCLUDE_IN(snaps)
|
2022-02-15 01:02:51 +01:00
|
|
|
export function getSnaps(state) {
|
|
|
|
return state.metamask.snaps;
|
|
|
|
}
|
2022-04-19 17:08:09 +02:00
|
|
|
|
2022-12-20 11:44:49 +01:00
|
|
|
export const getSnap = createDeepEqualSelector(
|
2022-12-01 16:46:06 +01:00
|
|
|
getSnaps,
|
|
|
|
(_, snapId) => snapId,
|
|
|
|
(snaps, snapId) => {
|
|
|
|
return snaps[snapId];
|
|
|
|
},
|
|
|
|
);
|
|
|
|
|
2022-12-20 11:44:49 +01:00
|
|
|
export const getInsightSnaps = createDeepEqualSelector(
|
|
|
|
getSnaps,
|
|
|
|
getPermissionSubjects,
|
|
|
|
(snaps, subjects) => {
|
|
|
|
return Object.values(snaps).filter(
|
|
|
|
({ id }) => subjects[id]?.permissions['endowment:transaction-insight'],
|
|
|
|
);
|
|
|
|
},
|
|
|
|
);
|
2022-09-20 19:00:07 +02:00
|
|
|
|
2022-04-19 17:08:09 +02:00
|
|
|
export const getSnapsRouteObjects = createSelector(getSnaps, (snaps) => {
|
|
|
|
return Object.values(snaps).map((snap) => {
|
|
|
|
return {
|
2022-06-01 19:09:13 +02:00
|
|
|
id: snap.id,
|
2022-04-19 17:08:09 +02:00
|
|
|
tabMessage: () => snap.manifest.proposedName,
|
|
|
|
descriptionMessage: () => snap.manifest.description,
|
|
|
|
sectionMessage: () => snap.manifest.description,
|
2022-05-11 22:14:53 +02:00
|
|
|
route: `${SNAPS_VIEW_ROUTE}/${encodeURIComponent(snap.id)}`,
|
2022-04-19 17:08:09 +02:00
|
|
|
icon: 'fa fa-flask',
|
|
|
|
};
|
|
|
|
});
|
|
|
|
});
|
2022-06-01 19:09:13 +02:00
|
|
|
|
|
|
|
/**
|
2022-07-27 15:28:05 +02:00
|
|
|
* @typedef {object} Notification
|
2022-06-01 19:09:13 +02:00
|
|
|
* @property {string} id - A unique identifier for the notification
|
|
|
|
* @property {string} origin - A string identifing the snap origin
|
|
|
|
* @property {EpochTimeStamp} createdDate - A date in epochTimeStramps, identifying when the notification was first committed
|
|
|
|
* @property {EpochTimeStamp} readDate - A date in epochTimeStramps, identifying when the notification was read by the user
|
|
|
|
* @property {string} message - A string containing the notification message
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Notifications are managed by the notification controller and referenced by
|
|
|
|
* `state.metamask.notifications`. This function returns a list of notifications
|
|
|
|
* the can be shown to the user.
|
|
|
|
*
|
|
|
|
* The returned notifications are sorted by date.
|
|
|
|
*
|
2022-07-27 15:28:05 +02:00
|
|
|
* @param {object} state - the redux state object
|
2022-06-01 19:09:13 +02:00
|
|
|
* @returns {Notification[]} An array of notifications that can be shown to the user
|
|
|
|
*/
|
|
|
|
|
|
|
|
export function getNotifications(state) {
|
|
|
|
const notifications = Object.values(state.metamask.notifications);
|
|
|
|
|
|
|
|
const notificationsSortedByDate = notifications.sort(
|
|
|
|
(a, b) => new Date(b.createdDate) - new Date(a.createdDate),
|
|
|
|
);
|
|
|
|
return notificationsSortedByDate;
|
|
|
|
}
|
|
|
|
|
|
|
|
export function getUnreadNotifications(state) {
|
|
|
|
const notifications = getNotifications(state);
|
|
|
|
|
|
|
|
const unreadNotificationCount = notifications.filter(
|
|
|
|
(notification) => notification.readDate === null,
|
|
|
|
);
|
|
|
|
|
|
|
|
return unreadNotificationCount;
|
|
|
|
}
|
|
|
|
|
|
|
|
export const getUnreadNotificationsCount = createSelector(
|
|
|
|
getUnreadNotifications,
|
|
|
|
(notifications) => notifications.length,
|
|
|
|
);
|
2022-02-15 01:02:51 +01:00
|
|
|
///: END:ONLY_INCLUDE_IN
|
|
|
|
|
2021-05-14 19:17:56 +02:00
|
|
|
/**
|
2022-04-27 10:36:32 +02:00
|
|
|
* Get an object of announcement IDs and if they are allowed or not.
|
2022-01-07 16:57:33 +01:00
|
|
|
*
|
2022-07-27 15:28:05 +02:00
|
|
|
* @param {object} state
|
|
|
|
* @returns {object}
|
2021-05-14 19:17:56 +02:00
|
|
|
*/
|
2022-04-27 10:36:32 +02:00
|
|
|
function getAllowedAnnouncementIds(state) {
|
2021-11-03 23:35:39 +01:00
|
|
|
const currentKeyring = getCurrentKeyring(state);
|
2023-03-21 15:43:22 +01:00
|
|
|
const currentKeyringIsLedger = currentKeyring?.type === KeyringType.ledger;
|
2021-11-03 23:35:39 +01:00
|
|
|
const supportsWebHid = window.navigator.hid !== undefined;
|
|
|
|
const currentlyUsingLedgerLive =
|
2023-01-20 16:14:40 +01:00
|
|
|
getLedgerTransportType(state) === LedgerTransportTypes.live;
|
2023-04-19 23:53:07 +02:00
|
|
|
const isFirefox = window.navigator.userAgent.includes('Firefox');
|
2023-06-20 18:57:14 +02:00
|
|
|
const isSwapsChain = getIsSwapsChain(state);
|
2021-11-03 23:35:39 +01:00
|
|
|
|
2021-05-14 19:17:56 +02:00
|
|
|
return {
|
2021-11-01 11:46:05 +01:00
|
|
|
1: false,
|
|
|
|
2: false,
|
|
|
|
3: false,
|
|
|
|
4: false,
|
|
|
|
5: false,
|
|
|
|
6: false,
|
|
|
|
7: false,
|
2021-11-03 23:35:39 +01:00
|
|
|
8: supportsWebHid && currentKeyringIsLedger && currentlyUsingLedgerLive,
|
2022-07-19 01:41:10 +02:00
|
|
|
9: false,
|
2022-11-15 20:17:28 +01:00
|
|
|
10: false,
|
|
|
|
11: false,
|
2022-07-19 01:41:10 +02:00
|
|
|
12: false,
|
2022-10-27 12:25:30 +02:00
|
|
|
13: false,
|
2022-10-31 17:20:50 +01:00
|
|
|
14: false,
|
2022-11-15 20:17:28 +01:00
|
|
|
15: false,
|
2023-04-06 17:08:11 +02:00
|
|
|
16: false,
|
|
|
|
17: false,
|
2023-06-29 18:21:58 +02:00
|
|
|
18: false,
|
|
|
|
19: false,
|
2023-04-19 23:53:07 +02:00
|
|
|
20: currentKeyringIsLedger && isFirefox,
|
2023-06-20 18:57:14 +02:00
|
|
|
21: isSwapsChain,
|
2021-05-14 19:17:56 +02:00
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2021-04-28 18:51:41 +02:00
|
|
|
/**
|
2022-07-27 15:28:05 +02:00
|
|
|
* @typedef {object} Announcement
|
2022-06-01 19:09:13 +02:00
|
|
|
* @property {number} id - A unique identifier for the announcement
|
2021-04-28 18:51:41 +02:00
|
|
|
* @property {string} date - A date in YYYY-MM-DD format, identifying when the notification was first committed
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
2022-04-27 10:36:32 +02:00
|
|
|
* Announcements are managed by the announcement controller and referenced by
|
|
|
|
* `state.metamask.announcements`. This function returns a list of announcements
|
|
|
|
* the can be shown to the user. This list includes all announcements that do not
|
2021-04-28 18:51:41 +02:00
|
|
|
* have a truthy `isShown` property.
|
|
|
|
*
|
2022-04-27 10:36:32 +02:00
|
|
|
* The returned announcements are sorted by date.
|
2021-04-28 18:51:41 +02:00
|
|
|
*
|
2022-07-27 15:28:05 +02:00
|
|
|
* @param {object} state - the redux state object
|
2022-04-27 10:36:32 +02:00
|
|
|
* @returns {Announcement[]} An array of announcements that can be shown to the user
|
2021-04-28 18:51:41 +02:00
|
|
|
*/
|
|
|
|
|
2022-04-27 10:36:32 +02:00
|
|
|
export function getSortedAnnouncementsToShow(state) {
|
|
|
|
const announcements = Object.values(state.metamask.announcements);
|
|
|
|
const allowedAnnouncementIds = getAllowedAnnouncementIds(state);
|
|
|
|
const announcementsToShow = announcements.filter(
|
|
|
|
(announcement) =>
|
|
|
|
!announcement.isShown && allowedAnnouncementIds[announcement.id],
|
2021-04-28 18:51:41 +02:00
|
|
|
);
|
2022-04-27 10:36:32 +02:00
|
|
|
const announcementsSortedByDate = announcementsToShow.sort(
|
2021-04-28 18:51:41 +02:00
|
|
|
(a, b) => new Date(b.date) - new Date(a.date),
|
|
|
|
);
|
2022-04-27 10:36:32 +02:00
|
|
|
return announcementsSortedByDate;
|
2021-04-28 18:51:41 +02:00
|
|
|
}
|
2021-06-05 08:33:58 +02:00
|
|
|
|
|
|
|
export function getShowRecoveryPhraseReminder(state) {
|
|
|
|
const {
|
|
|
|
recoveryPhraseReminderLastShown,
|
|
|
|
recoveryPhraseReminderHasBeenShown,
|
|
|
|
} = state.metamask;
|
|
|
|
|
|
|
|
const currentTime = new Date().getTime();
|
|
|
|
const frequency = recoveryPhraseReminderHasBeenShown ? DAY * 90 : DAY * 2;
|
|
|
|
|
|
|
|
return currentTime - recoveryPhraseReminderLastShown >= frequency;
|
|
|
|
}
|
2021-09-09 22:56:27 +02:00
|
|
|
|
2023-04-14 18:51:13 +02:00
|
|
|
export function getShowTermsOfUse(state) {
|
|
|
|
const { termsOfUseLastAgreed } = state.metamask;
|
|
|
|
|
|
|
|
if (!termsOfUseLastAgreed) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return (
|
|
|
|
new Date(termsOfUseLastAgreed).getTime() <
|
|
|
|
new Date(TERMS_OF_USE_LAST_UPDATED).getTime()
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2023-02-02 19:56:41 +01:00
|
|
|
export function getShowOutdatedBrowserWarning(state) {
|
|
|
|
const { outdatedBrowserWarningLastShown } = state.metamask;
|
|
|
|
if (!outdatedBrowserWarningLastShown) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
const currentTime = new Date().getTime();
|
|
|
|
return currentTime - outdatedBrowserWarningLastShown >= DAY * 2;
|
|
|
|
}
|
|
|
|
|
2022-11-16 18:41:15 +01:00
|
|
|
export function getShowBetaHeader(state) {
|
|
|
|
return state.metamask.showBetaHeader;
|
|
|
|
}
|
|
|
|
|
2023-04-21 17:28:18 +02:00
|
|
|
export function getShowProductTour(state) {
|
|
|
|
return state.metamask.showProductTour;
|
|
|
|
}
|
2021-09-09 22:56:27 +02:00
|
|
|
/**
|
|
|
|
* To get the useTokenDetection flag which determines whether a static or dynamic token list is used
|
2022-01-07 16:57:33 +01:00
|
|
|
*
|
2021-09-09 22:56:27 +02:00
|
|
|
* @param {*} state
|
|
|
|
* @returns Boolean
|
|
|
|
*/
|
|
|
|
export function getUseTokenDetection(state) {
|
|
|
|
return Boolean(state.metamask.useTokenDetection);
|
|
|
|
}
|
|
|
|
|
2021-11-26 19:54:57 +01:00
|
|
|
/**
|
2022-11-15 19:49:42 +01:00
|
|
|
* To get the useNftDetection flag which determines whether we autodetect NFTs
|
2022-01-07 16:57:33 +01:00
|
|
|
*
|
2021-11-26 19:54:57 +01:00
|
|
|
* @param {*} state
|
|
|
|
* @returns Boolean
|
|
|
|
*/
|
2022-11-15 19:49:42 +01:00
|
|
|
export function getUseNftDetection(state) {
|
|
|
|
return Boolean(state.metamask.useNftDetection);
|
2021-11-26 19:54:57 +01:00
|
|
|
}
|
|
|
|
|
2021-12-01 05:12:27 +01:00
|
|
|
/**
|
|
|
|
* To get the openSeaEnabled flag which determines whether we use OpenSea's API
|
2022-01-07 16:57:33 +01:00
|
|
|
*
|
2021-12-01 05:12:27 +01:00
|
|
|
* @param {*} state
|
|
|
|
* @returns Boolean
|
|
|
|
*/
|
|
|
|
export function getOpenSeaEnabled(state) {
|
|
|
|
return Boolean(state.metamask.openSeaEnabled);
|
|
|
|
}
|
|
|
|
|
2022-03-07 19:53:19 +01:00
|
|
|
/**
|
|
|
|
* To get the `theme` value which determines which theme is selected
|
|
|
|
*
|
|
|
|
* @param {*} state
|
|
|
|
* @returns Boolean
|
|
|
|
*/
|
|
|
|
export function getTheme(state) {
|
|
|
|
return state.metamask.theme;
|
|
|
|
}
|
|
|
|
|
2021-09-09 22:56:27 +02:00
|
|
|
/**
|
2022-08-10 03:26:25 +02:00
|
|
|
* To retrieve the token list for use throughout the UI. Will return the remotely fetched list
|
|
|
|
* from the tokens controller if token detection is enabled, or the static list if not.
|
2022-01-07 16:57:33 +01:00
|
|
|
*
|
2021-09-09 22:56:27 +02:00
|
|
|
* @param {*} state
|
2022-07-27 15:28:05 +02:00
|
|
|
* @returns {object}
|
2021-09-09 22:56:27 +02:00
|
|
|
*/
|
|
|
|
export function getTokenList(state) {
|
2022-08-10 03:26:25 +02:00
|
|
|
const isTokenDetectionInactiveOnMainnet =
|
|
|
|
getIsTokenDetectionInactiveOnMainnet(state);
|
|
|
|
const caseInSensitiveTokenList = isTokenDetectionInactiveOnMainnet
|
|
|
|
? STATIC_MAINNET_TOKEN_LIST
|
|
|
|
: state.metamask.tokenList;
|
|
|
|
return caseInSensitiveTokenList;
|
2021-09-09 22:56:27 +02:00
|
|
|
}
|
2021-10-21 21:17:03 +02:00
|
|
|
|
|
|
|
export function doesAddressRequireLedgerHidConnection(state, address) {
|
|
|
|
const addressIsLedger = isAddressLedger(state, address);
|
|
|
|
const transportTypePreferenceIsWebHID =
|
2023-01-20 16:14:40 +01:00
|
|
|
getLedgerTransportType(state) === LedgerTransportTypes.webhid;
|
2021-10-21 21:17:03 +02:00
|
|
|
const webHidIsNotConnected =
|
2023-01-20 16:14:40 +01:00
|
|
|
getLedgerWebHidConnectedStatus(state) !== WebHIDConnectedStatuses.connected;
|
2021-11-04 19:19:53 +01:00
|
|
|
const ledgerTransportStatus = getLedgerTransportStatus(state);
|
|
|
|
const transportIsNotSuccessfullyCreated =
|
2023-01-20 16:14:40 +01:00
|
|
|
ledgerTransportStatus !== HardwareTransportStates.verified;
|
2021-10-21 21:17:03 +02:00
|
|
|
|
|
|
|
return (
|
2021-11-04 19:19:53 +01:00
|
|
|
addressIsLedger &&
|
|
|
|
transportTypePreferenceIsWebHID &&
|
|
|
|
(webHidIsNotConnected || transportIsNotSuccessfullyCreated)
|
2021-10-21 21:17:03 +02:00
|
|
|
);
|
|
|
|
}
|
2021-10-25 22:38:43 +02:00
|
|
|
|
2023-02-16 20:23:29 +01:00
|
|
|
export function getNewNftAddedMessage(state) {
|
2023-02-10 16:36:58 +01:00
|
|
|
return state.appState.newNftAddedMessage;
|
2021-11-26 21:03:35 +01:00
|
|
|
}
|
|
|
|
|
2023-02-16 20:23:29 +01:00
|
|
|
export function getRemoveNftMessage(state) {
|
2023-02-10 16:36:58 +01:00
|
|
|
return state.appState.removeNftMessage;
|
2023-01-23 12:53:44 +01:00
|
|
|
}
|
|
|
|
|
2021-10-25 22:38:43 +02:00
|
|
|
/**
|
|
|
|
* To retrieve the name of the new Network added using add network form
|
2022-01-07 16:57:33 +01:00
|
|
|
*
|
2021-10-25 22:38:43 +02:00
|
|
|
* @param {*} state
|
|
|
|
* @returns string
|
|
|
|
*/
|
|
|
|
export function getNewNetworkAdded(state) {
|
2023-03-09 22:00:28 +01:00
|
|
|
return state.appState.newNetworkAddedName;
|
2021-10-25 22:38:43 +02:00
|
|
|
}
|
2021-11-04 22:48:21 +01:00
|
|
|
|
2023-03-09 22:00:28 +01:00
|
|
|
export function getNetworksTabSelectedNetworkConfigurationId(state) {
|
|
|
|
return state.appState.selectedNetworkConfigurationId;
|
2021-11-04 22:48:21 +01:00
|
|
|
}
|
|
|
|
|
2023-03-09 22:00:28 +01:00
|
|
|
export function getNetworkConfigurations(state) {
|
|
|
|
return state.metamask.networkConfigurations;
|
2021-11-04 22:48:21 +01:00
|
|
|
}
|
2021-11-11 17:46:45 +01:00
|
|
|
|
2023-04-13 18:54:03 +02:00
|
|
|
export function getCurrentNetwork(state) {
|
|
|
|
const allNetworks = getAllNetworks(state);
|
2023-07-13 20:29:53 +02:00
|
|
|
const providerConfig = getProviderConfig(state);
|
2023-04-13 18:54:03 +02:00
|
|
|
|
2023-07-13 20:29:53 +02:00
|
|
|
const filter =
|
|
|
|
providerConfig.type === 'rpc'
|
|
|
|
? (network) => network.id === providerConfig.id
|
|
|
|
: (network) => network.id === providerConfig.type;
|
|
|
|
return allNetworks.find(filter);
|
2023-04-13 18:54:03 +02:00
|
|
|
}
|
|
|
|
|
2023-04-26 15:22:18 +02:00
|
|
|
export function getAllEnabledNetworks(state) {
|
2023-07-05 12:01:45 +02:00
|
|
|
const nonTestNetworks = getNonTestNetworks(state);
|
2023-04-26 15:22:18 +02:00
|
|
|
const allNetworks = getAllNetworks(state);
|
|
|
|
const showTestnetNetworks = getShowTestNetworks(state);
|
|
|
|
|
2023-07-05 12:01:45 +02:00
|
|
|
return showTestnetNetworks ? allNetworks : nonTestNetworks;
|
2023-04-26 15:22:18 +02:00
|
|
|
}
|
|
|
|
|
2023-07-05 12:01:45 +02:00
|
|
|
export function getTestNetworks(state) {
|
2023-03-31 19:58:25 +02:00
|
|
|
const networkConfigurations = getNetworkConfigurations(state) || {};
|
2023-05-15 17:15:39 +02:00
|
|
|
|
2023-07-05 12:01:45 +02:00
|
|
|
return [
|
2023-05-15 17:15:39 +02:00
|
|
|
{
|
|
|
|
chainId: CHAIN_IDS.GOERLI,
|
|
|
|
nickname: GOERLI_DISPLAY_NAME,
|
|
|
|
rpcUrl: CHAIN_ID_TO_RPC_URL_MAP[CHAIN_IDS.GOERLI],
|
|
|
|
providerType: NETWORK_TYPES.GOERLI,
|
|
|
|
ticker: TEST_NETWORK_TICKER_MAP[NETWORK_TYPES.GOERLI],
|
2023-07-13 20:29:53 +02:00
|
|
|
id: NETWORK_TYPES.GOERLI,
|
2023-05-15 17:15:39 +02:00
|
|
|
},
|
|
|
|
{
|
|
|
|
chainId: CHAIN_IDS.SEPOLIA,
|
|
|
|
nickname: SEPOLIA_DISPLAY_NAME,
|
|
|
|
rpcUrl: CHAIN_ID_TO_RPC_URL_MAP[CHAIN_IDS.SEPOLIA],
|
|
|
|
providerType: NETWORK_TYPES.SEPOLIA,
|
|
|
|
ticker: TEST_NETWORK_TICKER_MAP[NETWORK_TYPES.SEPOLIA],
|
2023-07-13 20:29:53 +02:00
|
|
|
id: NETWORK_TYPES.SEPOLIA,
|
2023-05-15 17:15:39 +02:00
|
|
|
},
|
|
|
|
{
|
2023-06-15 13:38:07 +02:00
|
|
|
chainId: CHAIN_IDS.LINEA_GOERLI,
|
|
|
|
nickname: LINEA_GOERLI_DISPLAY_NAME,
|
|
|
|
rpcUrl: CHAIN_ID_TO_RPC_URL_MAP[CHAIN_IDS.LINEA_GOERLI],
|
|
|
|
rpcPrefs: {
|
|
|
|
imageUrl: LINEA_GOERLI_TOKEN_IMAGE_URL,
|
|
|
|
},
|
|
|
|
providerType: NETWORK_TYPES.LINEA_GOERLI,
|
|
|
|
ticker: TEST_NETWORK_TICKER_MAP[NETWORK_TYPES.LINEA_GOERLI],
|
2023-07-13 20:29:53 +02:00
|
|
|
id: NETWORK_TYPES.LINEA_GOERLI,
|
2023-05-15 17:15:39 +02:00
|
|
|
},
|
|
|
|
// Localhosts
|
|
|
|
...Object.values(networkConfigurations).filter(
|
|
|
|
({ chainId }) => chainId === CHAIN_IDS.LOCALHOST,
|
|
|
|
),
|
|
|
|
];
|
2023-07-05 12:01:45 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
export function getNonTestNetworks(state) {
|
|
|
|
const networkConfigurations = getNetworkConfigurations(state) || {};
|
|
|
|
|
|
|
|
return [
|
|
|
|
// Mainnet always first
|
|
|
|
{
|
|
|
|
chainId: CHAIN_IDS.MAINNET,
|
|
|
|
nickname: MAINNET_DISPLAY_NAME,
|
|
|
|
rpcUrl: CHAIN_ID_TO_RPC_URL_MAP[CHAIN_IDS.MAINNET],
|
|
|
|
rpcPrefs: {
|
|
|
|
imageUrl: ETH_TOKEN_IMAGE_URL,
|
|
|
|
},
|
|
|
|
providerType: NETWORK_TYPES.MAINNET,
|
|
|
|
ticker: CURRENCY_SYMBOLS.ETH,
|
2023-07-13 20:29:53 +02:00
|
|
|
id: NETWORK_TYPES.MAINNET,
|
2023-07-05 12:01:45 +02:00
|
|
|
},
|
|
|
|
{
|
|
|
|
chainId: CHAIN_IDS.LINEA_MAINNET,
|
|
|
|
nickname: LINEA_MAINNET_DISPLAY_NAME,
|
|
|
|
rpcUrl: CHAIN_ID_TO_RPC_URL_MAP[CHAIN_IDS.LINEA_MAINNET],
|
|
|
|
rpcPrefs: {
|
|
|
|
imageUrl: LINEA_MAINNET_TOKEN_IMAGE_URL,
|
|
|
|
},
|
|
|
|
providerType: NETWORK_TYPES.LINEA_MAINNET,
|
|
|
|
ticker: TEST_NETWORK_TICKER_MAP[NETWORK_TYPES.LINEA_MAINNET],
|
2023-07-13 20:29:53 +02:00
|
|
|
id: NETWORK_TYPES.LINEA_MAINNET,
|
2023-07-05 12:01:45 +02:00
|
|
|
},
|
|
|
|
// Custom networks added by the user
|
|
|
|
...Object.values(networkConfigurations).filter(
|
|
|
|
({ chainId }) => ![CHAIN_IDS.LOCALHOST].includes(chainId),
|
|
|
|
),
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
export function getAllNetworks(state) {
|
|
|
|
const networks = [
|
|
|
|
// Mainnet and custom networks
|
|
|
|
...getNonTestNetworks(state),
|
|
|
|
// Test networks
|
|
|
|
...getTestNetworks(state),
|
|
|
|
];
|
2023-03-31 19:58:25 +02:00
|
|
|
|
|
|
|
return networks;
|
|
|
|
}
|
|
|
|
|
2021-11-11 17:46:45 +01:00
|
|
|
export function getIsOptimism(state) {
|
|
|
|
return (
|
2022-09-14 16:55:31 +02:00
|
|
|
getCurrentChainId(state) === CHAIN_IDS.OPTIMISM ||
|
|
|
|
getCurrentChainId(state) === CHAIN_IDS.OPTIMISM_TESTNET
|
2021-11-11 17:46:45 +01:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
export function getIsMultiLayerFeeNetwork(state) {
|
|
|
|
return getIsOptimism(state);
|
|
|
|
}
|
2021-11-11 20:18:50 +01:00
|
|
|
/**
|
|
|
|
* To retrieve the maxBaseFee and priotitFee teh user has set as default
|
2022-01-07 16:57:33 +01:00
|
|
|
*
|
|
|
|
* @param {*} state
|
|
|
|
* @returns Boolean
|
2021-11-11 20:18:50 +01:00
|
|
|
*/
|
|
|
|
export function getAdvancedGasFeeValues(state) {
|
|
|
|
return state.metamask.advancedGasFee;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* To check if the user has set advanced gas fee settings as default with a non empty maxBaseFee and priotityFee.
|
2022-01-07 16:57:33 +01:00
|
|
|
*
|
|
|
|
* @param {*} state
|
|
|
|
* @returns Boolean
|
2021-11-11 20:18:50 +01:00
|
|
|
*/
|
|
|
|
export function getIsAdvancedGasFeeDefault(state) {
|
|
|
|
const { advancedGasFee } = state.metamask;
|
|
|
|
return (
|
|
|
|
Boolean(advancedGasFee?.maxBaseFee) && Boolean(advancedGasFee?.priorityFee)
|
|
|
|
);
|
|
|
|
}
|
2022-03-31 15:48:05 +02:00
|
|
|
|
|
|
|
/**
|
2022-08-10 03:26:25 +02:00
|
|
|
* To get the name of the network that support token detection based in chainId.
|
|
|
|
*
|
2022-03-31 15:48:05 +02:00
|
|
|
* @param state
|
|
|
|
* @returns string e.g. ethereum, bsc or polygon
|
|
|
|
*/
|
|
|
|
export const getTokenDetectionSupportNetworkByChainId = (state) => {
|
|
|
|
const chainId = getCurrentChainId(state);
|
|
|
|
switch (chainId) {
|
2022-09-14 16:55:31 +02:00
|
|
|
case CHAIN_IDS.MAINNET:
|
2022-03-31 15:48:05 +02:00
|
|
|
return MAINNET_DISPLAY_NAME;
|
2022-09-14 16:55:31 +02:00
|
|
|
case CHAIN_IDS.BSC:
|
2022-03-31 15:48:05 +02:00
|
|
|
return BSC_DISPLAY_NAME;
|
2022-09-14 16:55:31 +02:00
|
|
|
case CHAIN_IDS.POLYGON:
|
2022-03-31 15:48:05 +02:00
|
|
|
return POLYGON_DISPLAY_NAME;
|
2022-09-14 16:55:31 +02:00
|
|
|
case CHAIN_IDS.AVALANCHE:
|
2022-03-31 15:48:05 +02:00
|
|
|
return AVALANCHE_DISPLAY_NAME;
|
2023-05-16 17:57:04 +02:00
|
|
|
case CHAIN_IDS.AURORA:
|
|
|
|
return AURORA_DISPLAY_NAME;
|
2022-03-31 15:48:05 +02:00
|
|
|
default:
|
|
|
|
return '';
|
|
|
|
}
|
|
|
|
};
|
|
|
|
/**
|
2023-05-16 17:57:04 +02:00
|
|
|
* To check if the chainId supports token detection,
|
|
|
|
* currently it returns true for Ethereum Mainnet, Polygon, BSC, Avalanche and Aurora
|
2022-03-31 15:48:05 +02:00
|
|
|
*
|
|
|
|
* @param {*} state
|
|
|
|
* @returns Boolean
|
|
|
|
*/
|
2022-08-10 03:26:25 +02:00
|
|
|
export function getIsDynamicTokenListAvailable(state) {
|
2022-03-31 15:48:05 +02:00
|
|
|
const chainId = getCurrentChainId(state);
|
|
|
|
return [
|
2022-09-14 16:55:31 +02:00
|
|
|
CHAIN_IDS.MAINNET,
|
|
|
|
CHAIN_IDS.BSC,
|
|
|
|
CHAIN_IDS.POLYGON,
|
|
|
|
CHAIN_IDS.AVALANCHE,
|
2023-05-16 17:57:04 +02:00
|
|
|
CHAIN_IDS.AURORA,
|
2022-03-31 15:48:05 +02:00
|
|
|
].includes(chainId);
|
|
|
|
}
|
|
|
|
|
2022-05-09 19:47:06 +02:00
|
|
|
/**
|
|
|
|
* To retrieve the list of tokens detected and saved on the state to detectedToken object.
|
|
|
|
*
|
|
|
|
* @param {*} state
|
|
|
|
* @returns list of token objects
|
|
|
|
*/
|
2022-04-13 18:23:41 +02:00
|
|
|
export function getDetectedTokensInCurrentNetwork(state) {
|
2022-12-14 07:56:08 +01:00
|
|
|
const currentChainId = getCurrentChainId(state);
|
|
|
|
const selectedAddress = getSelectedAddress(state);
|
|
|
|
return state.metamask.allDetectedTokens?.[currentChainId]?.[selectedAddress];
|
2022-03-31 15:48:05 +02:00
|
|
|
}
|
2022-05-09 19:47:06 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* To fetch the name of the tokens that are imported from tokens found page
|
|
|
|
*
|
|
|
|
* @param {*} state
|
|
|
|
* @returns
|
|
|
|
*/
|
|
|
|
export function getNewTokensImported(state) {
|
|
|
|
return state.appState.newTokensImported;
|
|
|
|
}
|
2022-06-30 18:19:07 +02:00
|
|
|
|
2022-08-10 03:26:25 +02:00
|
|
|
/**
|
|
|
|
* To check if the token detection is OFF and the network is Mainnet
|
|
|
|
* so that the user can skip third party token api fetch
|
|
|
|
* and use the static tokenlist from contract-metadata
|
|
|
|
*
|
|
|
|
* @param {*} state
|
|
|
|
* @returns Boolean
|
|
|
|
*/
|
|
|
|
export function getIsTokenDetectionInactiveOnMainnet(state) {
|
|
|
|
const isMainnet = getIsMainnet(state);
|
|
|
|
const useTokenDetection = getUseTokenDetection(state);
|
|
|
|
|
|
|
|
return !useTokenDetection && isMainnet;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* To check for the chainId that supports token detection ,
|
2023-05-16 17:57:04 +02:00
|
|
|
* currently it returns true for Ethereum Mainnet, Polygon, BSC, Avalanche and Aurora
|
2022-08-10 03:26:25 +02:00
|
|
|
*
|
|
|
|
* @param {*} state
|
|
|
|
* @returns Boolean
|
|
|
|
*/
|
|
|
|
export function getIsTokenDetectionSupported(state) {
|
|
|
|
const useTokenDetection = getUseTokenDetection(state);
|
|
|
|
const isDynamicTokenListAvailable = getIsDynamicTokenListAvailable(state);
|
|
|
|
|
|
|
|
return useTokenDetection && isDynamicTokenListAvailable;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* To check if the token detection is OFF for the token detection supported networks
|
|
|
|
* and the network is not Mainnet
|
|
|
|
*
|
|
|
|
* @param {*} state
|
|
|
|
* @returns Boolean
|
|
|
|
*/
|
|
|
|
export function getIstokenDetectionInactiveOnNonMainnetSupportedNetwork(state) {
|
|
|
|
const useTokenDetection = getUseTokenDetection(state);
|
|
|
|
const isMainnet = getIsMainnet(state);
|
|
|
|
const isDynamicTokenListAvailable = getIsDynamicTokenListAvailable(state);
|
|
|
|
|
|
|
|
return isDynamicTokenListAvailable && !useTokenDetection && !isMainnet;
|
|
|
|
}
|
|
|
|
|
2022-11-17 15:13:02 +01:00
|
|
|
/**
|
|
|
|
* To get the `transactionSecurityCheckEnabled` value which determines whether we use the transaction security check
|
|
|
|
*
|
|
|
|
* @param {*} state
|
|
|
|
* @returns Boolean
|
|
|
|
*/
|
|
|
|
export function getIsTransactionSecurityCheckEnabled(state) {
|
|
|
|
return state.metamask.transactionSecurityCheckEnabled;
|
|
|
|
}
|
|
|
|
|
2022-08-02 23:56:02 +02:00
|
|
|
export function getIsCustomNetwork(state) {
|
|
|
|
const chainId = getCurrentChainId(state);
|
|
|
|
|
|
|
|
return !CHAIN_ID_TO_RPC_URL_MAP[chainId];
|
|
|
|
}
|
|
|
|
|
|
|
|
export function getBlockExplorerLinkText(
|
|
|
|
state,
|
|
|
|
accountDetailsModalComponent = false,
|
|
|
|
) {
|
|
|
|
const isCustomNetwork = getIsCustomNetwork(state);
|
|
|
|
const rpcPrefs = getRpcPrefsForCurrentProvider(state);
|
|
|
|
|
|
|
|
let blockExplorerLinkText = {
|
|
|
|
firstPart: 'addBlockExplorer',
|
|
|
|
secondPart: '',
|
|
|
|
};
|
|
|
|
|
|
|
|
if (rpcPrefs.blockExplorerUrl) {
|
|
|
|
blockExplorerLinkText = accountDetailsModalComponent
|
|
|
|
? {
|
|
|
|
firstPart: 'blockExplorerView',
|
|
|
|
secondPart: getURLHostName(rpcPrefs.blockExplorerUrl),
|
|
|
|
}
|
|
|
|
: {
|
|
|
|
firstPart: 'viewinExplorer',
|
|
|
|
secondPart: 'blockExplorerAccountAction',
|
|
|
|
};
|
|
|
|
} else if (isCustomNetwork === false) {
|
|
|
|
blockExplorerLinkText = accountDetailsModalComponent
|
|
|
|
? { firstPart: 'etherscanViewOn', secondPart: '' }
|
|
|
|
: {
|
|
|
|
firstPart: 'viewOnEtherscan',
|
|
|
|
secondPart: 'blockExplorerAccountAction',
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
return blockExplorerLinkText;
|
|
|
|
}
|
2022-08-23 17:04:07 +02:00
|
|
|
|
|
|
|
export function getIsNetworkUsed(state) {
|
|
|
|
const chainId = getCurrentChainId(state);
|
|
|
|
const { usedNetworks } = state.metamask;
|
|
|
|
|
|
|
|
return Boolean(usedNetworks[chainId]);
|
|
|
|
}
|
|
|
|
|
2022-09-14 17:35:59 +02:00
|
|
|
export function getAllAccountsOnNetworkAreEmpty(state) {
|
2022-08-23 17:04:07 +02:00
|
|
|
const balances = getMetaMaskCachedBalances(state) ?? {};
|
2022-09-14 17:35:59 +02:00
|
|
|
const hasNoNativeFundsOnAnyAccounts = Object.values(balances).every(
|
|
|
|
(balance) => balance === '0x0' || balance === '0x00',
|
|
|
|
);
|
|
|
|
const hasNoTokens = getNumberOfTokens(state) === 0;
|
2022-08-23 17:04:07 +02:00
|
|
|
|
2022-09-14 17:35:59 +02:00
|
|
|
return hasNoNativeFundsOnAnyAccounts && hasNoTokens;
|
2022-08-23 17:04:07 +02:00
|
|
|
}
|
2022-09-19 19:40:30 +02:00
|
|
|
|
|
|
|
export function getShouldShowSeedPhraseReminder(state) {
|
|
|
|
const { tokens, seedPhraseBackedUp, dismissSeedBackUpReminder } =
|
|
|
|
state.metamask;
|
|
|
|
const accountBalance = getCurrentEthBalance(state) ?? 0;
|
|
|
|
return (
|
|
|
|
seedPhraseBackedUp === false &&
|
|
|
|
(parseInt(accountBalance, 16) > 0 || tokens.length > 0) &&
|
|
|
|
dismissSeedBackUpReminder === false
|
|
|
|
);
|
|
|
|
}
|
2022-11-07 19:21:38 +01:00
|
|
|
|
|
|
|
export function getCustomTokenAmount(state) {
|
|
|
|
return state.appState.customTokenAmount;
|
|
|
|
}
|
2023-01-17 16:23:04 +01:00
|
|
|
|
2023-04-21 17:28:18 +02:00
|
|
|
export function getOnboardedInThisUISession(state) {
|
|
|
|
return state.appState.onboardedInThisUISession;
|
|
|
|
}
|
|
|
|
|
2023-01-17 16:23:04 +01:00
|
|
|
/**
|
|
|
|
* To get the useCurrencyRateCheck flag which to check if the user prefers currency conversion
|
|
|
|
*
|
|
|
|
* @param {*} state
|
|
|
|
* @returns Boolean
|
|
|
|
*/
|
|
|
|
export function getUseCurrencyRateCheck(state) {
|
|
|
|
return Boolean(state.metamask.useCurrencyRateCheck);
|
|
|
|
}
|
2023-02-23 17:39:48 +01:00
|
|
|
|
2023-04-25 16:32:51 +02:00
|
|
|
///: BEGIN:ONLY_INCLUDE_IN(desktop)
|
2023-02-23 17:39:48 +01:00
|
|
|
/**
|
|
|
|
* To get the `desktopEnabled` value which determines whether we use the desktop app
|
|
|
|
*
|
|
|
|
* @param {*} state
|
|
|
|
* @returns Boolean
|
|
|
|
*/
|
|
|
|
export function getIsDesktopEnabled(state) {
|
|
|
|
return state.metamask.desktopEnabled;
|
|
|
|
}
|
|
|
|
///: END:ONLY_INCLUDE_IN
|
2023-04-24 12:21:37 +02:00
|
|
|
|
2023-04-25 16:32:51 +02:00
|
|
|
///: BEGIN:ONLY_INCLUDE_IN(snaps)
|
2023-04-24 12:21:37 +02:00
|
|
|
/**
|
|
|
|
* To get all installed snaps with proper metadata
|
|
|
|
*
|
|
|
|
* @param {*} state
|
|
|
|
* @returns Boolean
|
|
|
|
*/
|
|
|
|
export function getSnapsList(state) {
|
|
|
|
const snaps = getSnaps(state);
|
|
|
|
return Object.entries(snaps).map(([key, snap]) => {
|
|
|
|
const targetSubjectMetadata = getTargetSubjectMetadata(state, snap?.id);
|
|
|
|
|
|
|
|
return {
|
|
|
|
key,
|
|
|
|
id: snap.id,
|
|
|
|
packageName: removeSnapIdPrefix(snap.id),
|
|
|
|
name: getSnapName(snap.id, targetSubjectMetadata),
|
|
|
|
};
|
|
|
|
});
|
|
|
|
}
|
2023-05-31 14:43:39 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* To get the state of snaps privacy warning popover.
|
|
|
|
*
|
|
|
|
* @param state - Redux state object.
|
|
|
|
* @returns True if popover has been shown, false otherwise.
|
|
|
|
*/
|
|
|
|
export function getSnapsInstallPrivacyWarningShown(state) {
|
|
|
|
const { snapsInstallPrivacyWarningShown } = state.metamask;
|
|
|
|
|
|
|
|
if (
|
|
|
|
snapsInstallPrivacyWarningShown === undefined ||
|
|
|
|
snapsInstallPrivacyWarningShown === null
|
|
|
|
) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return snapsInstallPrivacyWarningShown;
|
|
|
|
}
|
2023-04-24 12:21:37 +02:00
|
|
|
///: END:ONLY_INCLUDE_IN
|
[FLASK] Add Snaps Keyring (#19710)
* flask - add restricted snap_manageAccounts
* snap keyring: use local snap keyring instead of package
* mvp snap-keyring
* fixed the easier lint errors
* fix missing permission text
* add removal function
* update snap keyring
* update dep
* update git link
* update messages and remove snap keyring from lib
* set snapprovider as soon as possible
* chore: update snap keyring dependency
* chore: pass SnapController to SnapKeyring constructor
* chore: update deps and comment line (wip)
* fix latest update for snaps and remove setController
* update yarn lock
* add routes
* add messages
* add message
* add snap account detail page
* add snap account card
* add snap account page
* update route
* add background
* use css grid
* update snap text styling
* fix lint
* remove unused import
* change manage link to go to snap
* add types for react-router-dom
* add link to settings
* add breadcrumb to header
* add popover
* add prop types
* add link to propTypes
* fix icon in header and tag
* update popover
* update yarn.lock
* add link to account list menu
* update from deprecated
* add add-snap-popup
* use popoverheader
* fix lint
* update to use modal instead of popup
* add install snap
* remove export of DeferredPromise
* change snap keyring to its own enum
* update imports and fences
* fix snapId and route
* fix header and button for snapCard
* hide app header on AddSnapAccountPage
* update icon
* match path to SnapAccountDetail
* set getting started button to close modal
* fix key prop warning
* add By Metamask message
* fix label
* add fence to snapkeyringtype
* update yarn.lock
* refactor removeAccount and static snap list
* update removeSnap
* feat: remove associated accounts when snap is removed
* add get snaps installed to snaps page
* fix updateAvailable
* add tests to ui components
* update test
* update scss
* udpate config snap popup style
* fixed https://www.notion.so/Show-pop-up-only-once-c6aa8494486a4ece8a5c5e35fea56ab5
* update accountListMenu click to open tab or push depending on environment
* update yark.lock
* remove unused uuid
* update lock
* update eth-snap-keyring
* udpate install from snap page
* update to install to use popup
* use release versino of eth-snap-keyring
* chore: bump snaps-utils version to `0.34.1-flask.1`
* update configure snap
* chore: update eth-snap-keyring
* chore: update policies
* fix: remove unused
* fix: fix snap-account-detail-page test
* fix: fix styles
* chore: remove swappable-obj-proxy
* fix: fix duplicate entry
* fix: disable export private key for snaps account
* feat: shuffle snap lists on every reload
* fix: configure not popping up
* refactor: snapsAddSnapAccountModalDismissal into action and selector
* fix: E2BIG when running prettier
* fix: lint default export or add-snap-account-modal
* fix: lint, remove vendor prefix
* fix: fix snapCreatedByMetamask to snapCreatedByMetaMask
* Add `manageAccounts` RPC method (#19724)
* Update dependencies
* Remove snap-keyring-permissions
* Update dependencies
* Update dependencies
* Update imports
* removed portfolio link from wallet view (#19716)
* removed portfolio link from wallet view
* removed unused code
* updated test
* updated spec file
* updated test
* Validate LavaMoat policies on each PR (#19703)
* Validate LavaMoat policies on each PR
The LavaMoat policies are now validated on every PR. This makes it
easier to validate policy changes, as they should always correspond
with the changes made in the PR (unlike today, when they could be due
to a change in platform or a previous PR).
Closes #19680
* Update LavaMoat policies
---------
Co-authored-by: MetaMask Bot <metamaskbot@users.noreply.github.com>
* fix(action): add required permissions to remove labels (#19728)
* Fix dependencies
* signature approved metrics e2e test (#19628)
* Update dependencies
* Integrate Snow with LavaMoat scuttling protection (#17969)
* Update lavamoat policies
* Security Provider cleanup (#19694)
* security-prov: isFlaggedSecurityProviderResponse
* security-prov: create shared/modules/util
* security prov: rn isFlagged -> isSuspcious
- util fn returns true if response is not verified and flagged
* security prov: add util test
and support undefined param
* security prov: reorg util fn
- no logic changes
* Update LavaMoat policies (#19744)
Update LavaMoat policies to match what CI expects.
* Replacing deprecated constants & creating stories (#19686)
* Replacing deprecated constants & creating stories
* updating snapshot
* fix: fix imports
* chore: update policy.json
* fix: move SmartTransactionController out of snaps code fence
* fix: yarn.lock dedupe
* fix: lavamoat policy
* fix: update test
* fix: remove snapshot, the list of snaps are always randomized.
* fix: resole snaps-controller to use flask
---------
Co-authored-by: Nidhi Kumari <nidhi.kumari@consensys.net>
Co-authored-by: Mark Stacey <markjstacey@gmail.com>
Co-authored-by: MetaMask Bot <metamaskbot@users.noreply.github.com>
Co-authored-by: Gauthier Petetin <gauthierpetetin@hotmail.com>
Co-authored-by: Brad Decker <bhdecker84@gmail.com>
Co-authored-by: weizman <weizmangal@gmail.com>
Co-authored-by: Ariella Vu <20778143+digiwand@users.noreply.github.com>
Co-authored-by: Dhruv <79097544+dhruvv173@users.noreply.github.com>
Co-authored-by: Monte Lai <monte.lai@consensys.net>
* Update LavaMoat policies
* chore: fix webapp policy.json
* feat: add snap label test
* feat: test to disable export private key for snap accounts
* feat: add snap account link test in account-list-menu
* fix: add fence for setSnapsAddSnapAccountModalDismissed
* fix: remove comments
* fix: move routes into snaps fence
* feat: use snap registry
* fix: account snap identification
* chore: add `keyring-snaps` feature flag
* fix: remove unneeded spread
* Disable warn logs in content-script (#19754)
* Use Yarn caching in GitHub Actions (#19662)
GitHub actions that install dependencies will now also cache those
dependencies using the standard strategy for Yarn (which is to hash the
lockfile).
This matches the module template (see https://github.com/MetaMask/metamask-module-template/pull/145
for details).
This should have no functional impact except that this action will run
faster when dependencies are unchanged.
* Fixing misspelling in 10.28.0 changelog notes (#19756)
* Add `tokenId` type validation in `wallet_watchAsset` middleware (#19738)
* Remove unused GitHub Action workflow (#19660)
This GitHub action workflow was disabled, but was still running setup
steps. It has now been removed entirely. We can re-introduce it again
later once the problem that led to it being disabled has been fixed.
The associated npm script and JavaScript module have been removed as
well.
* Fix #847 - Don't show account address on token pages (#19740)
Co-authored-by: Nidhi Kumari <nidhi.kumari@consensys.net>
* Deprecating FormField and fixing console error (#19739)
* Deprecating FormField and fixing console error
* Updating snapshots
* updated linea image for token and badge (#19717)
* updated linea image for token and badge
* replaced hardcoded string with constant
* UI updates for contacts Page (#19646)
* updated contacts flow update
* json file updates
* updated contacts edit and view list
* keep contacts tab selected
* lint fix
* replaced hardcoded strings with constant
* updated padding in box
* Replacing deprecated components and fixing prop errors (#19745)
* Use `snaps@0.35.2-flask.1` and `snaps@1.0.0-prerelease.1` (#19734)
* snaps@0.35.0-flask.1
* Update LavaMoat policies
* Update stable snaps packages to 1.0.0-prerelease.1
* Update LavaMoat policies
* Fix lint
* snaps@0.35.2
* Exclude snap_manageAccounts
* Code fencing
* Revert removing endowment:keyring exclusion
* Bump iframe URLs
* UX: Ensure multichain native token name is always shown (#19705)
* UX: Ensure multichain native token name is always shown
* Fix lint
* UX Multichain: fixed padding for edit screen (#19707)
* fixed padding for edit screen
* Use network picker for header trigger
* Fix swaps display
* updated snapshot
---------
Co-authored-by: David Walsh <davidwalsh83@gmail.com>
* Bump @metamask/providers to v11.1.0 (#19762)
* Bump @metamask/providers to v11.1.0
---------
Co-authored-by: Alex <adonesky@gmail.com>
* Fix fallback gas estimation (#19746)
* Fix fallback gas estimation
Our fallback gas estimation was failing due to a bug in the
`@metamask/controller-utils` package. This was causing gas estimation
to fail completely on certain networks (those not supported by our gas
estimation APIs and non EIP-1559 compatibile), and it was causing the
fallback gas estimation operation (in case our API was down) to fail
across all networks.
Fixes https://github.com/MetaMask/metamask-extension/issues/19735
* Add e2e tests
E2E tests have been added to capture gas estimation. Cases are added
for our API, for the fallback estimate, and for non-EIP-1559 estimates.
As part of this work, the legacy gas API had to be disabled. This was
being used in e2e tests but was dead code in production. It needed to
be disabled to ensure the code under test was reachable.
* Fix gas API referenced in e2e test
* Update unit test snapshots
* Update Label component font weight from bold to medium (#19731)
* Update Label component font weight from bold to medium
* update snapshot
* fix snapshots
* fix snapshots 2
* Removeing deprecated constants for enums
---------
Co-authored-by: georgewrmarshall <george.marshall@consensys.net>
* Part of #17670: Replace Typography with Text component in CancelSpeedupPopover (#18638)
* create story
* replace Typography with Text component
* review changes
* replace CSS with props styling
* use `Button` from `component-library`
* tooltip HTML refactor with `component-library` components
* remove whitespace in story
* strong tag support within Text component
* addresses #18651
* taken from #18752 as suggested in https://github.com/MetaMask/metamask-extension/pull/18638#discussion_r1176334805
* replace `strong` with new `Text as="strong"`
* remove unneccessary css from fa564e3f036f1439f9f220cca23595b508760614
* add text variant definition
* Updating text variant of button
* restrore proper spacing between elements
* Quick fix for test
* Adding key
---------
Co-authored-by: georgewrmarshall <george.marshall@consensys.net>
Co-authored-by: Garrett Bear <gwhisten@gmail.com>
* Issue 17670 replace typography with text (#19433)
* Replace Typograph with Text component in numeric-input-component.js
* Replace Typography with Text component in signature-request-message.js
* Replace Typography with Text component in signature-request.component.js
* Replacing deprecating constants and fixing some signature story warnings
* Updating snapshot
* Fixing import
---------
Co-authored-by: georgewrmarshall <george.marshall@consensys.net>
Co-authored-by: Garrett Bear <gwhisten@gmail.com>
* Part of #18714: Replacing deprecated constants in `confirm-subtitle` folder (#19699)
* repalcing deprecated constants
* resolve issue
* lint fixes
---------
Co-authored-by: georgewrmarshall <george.marshall@consensys.net>
* Part of #17670: Replace Typography with Text component in: callout.js (#18912)
* Part of #17670: Replace Typography with Text component in: callout.js
* Update ui/components/ui/callout/callout.js
Co-authored-by: Danica Shen <zhaodanica@gmail.com>
* Update callout.js
* Updating snapshot and deprecating component
* Updating snapshot and deprecating component
---------
Co-authored-by: Danica Shen <zhaodanica@gmail.com>
Co-authored-by: George Marshall <george.marshall@consensys.net>
Co-authored-by: Garrett Bear <gwhisten@gmail.com>
* [MMI] Added code fences in whats new popup (#19581)
* added code fences in whats new popup
* Improved code
* Added missing prop
* Update LavaMoat policies
* updated functions by using an options object for the rendering functions in order to bypass possible typsecript issues
---------
Co-authored-by: MetaMask Bot <metamaskbot@users.noreply.github.com>
* Updated action list in token, NFTs and activity view (#19702)
* updated ui for nft import button
* updated no nft image found in the center
* updated footer for all screens in tabs
* removed no nft state from nft tab
* updated snapshot
* lint fix
* fixed e2e tests
* fixed prep build error
* removed no nfts yet test
* updated tabs
* fixed prod error
* updated no nft screen
* changed button size to md
* fix: change 'M' to '?'
* fix: update fence to keyring-snaps
* chore: rename folder
* fix: typo
* chore: remove logs
* feat: add metamask developer constant
* fix: sass keyring-snap path
* chore: update yarn.lock
* fix: remove alias
* feat: add KEYRING_SNAPS_REGISTRY_URL env
* fix: nested fence
* feat: add snap manageAccount e2e (#19777)
* feat: add snap manageAccount e2e
* feat: update link
* fix: lint
* fix: get values of restrictedMethodPermissionBuilders
* fix: add fence to perferences
* fix: stop shuffle
* fix: remove KEYRING_SNAPS_REGISTRY_URL from metamaskRc
* fix: use permissions to determine account snaps
* fix: remove shuffle
* fix: add comments to fences in excluded snap permission.
* chore: fix policy.json
* fix: fix snap-account-detail test
* fix: lint
* fix: snap accoutn detail page test
* Update LavaMoat policies
* Update ui/pages/keyring-snaps/snap-account-detail-page/snap-account-detail-page.test.tsx
Co-authored-by: Maarten Zuidhoorn <maarten@zuidhoorn.com>
* Update ui/pages/keyring-snaps/snap-account-detail-page/snap-account-detail-page.test.tsx
Co-authored-by: Maarten Zuidhoorn <maarten@zuidhoorn.com>
* fix: remove fence from isAbleToExportAccount
* chore: remove comment line
* fix: dismiss snap modal
* fix: try catch for scroll
* fix: icon for manageAccount
* fix: update `handleSnapRequest` to make `params` optional and add `id`
* fix: lint for uuid
* fix: remove arg in saveSnapKeyring
* fix: add fence for uuidV4
* chore: bump dep
* fix: permission_manageAccounts message and icon
* chore: update registry link
* chore: convert address to lowercase
* fix: change icon
* chore: bump eth-snap-keyring
* chore: update webapp policy.json
* Update ui/pages/keyring-snaps/new-snap-account-page/new-snap-account-page.test.tsx
Co-authored-by: Gustavo Antunes <17601467+gantunesr@users.noreply.github.com>
* fix: update fences
* fix: nested fence
* Update app/_locales/en/messages.json
Co-authored-by: Maarten Zuidhoorn <maarten@zuidhoorn.com>
* Update app/_locales/en/messages.json
Co-authored-by: Maarten Zuidhoorn <maarten@zuidhoorn.com>
* Update app/_locales/en/messages.json
Co-authored-by: Maarten Zuidhoorn <maarten@zuidhoorn.com>
* Update app/_locales/en/messages.json
Co-authored-by: Maarten Zuidhoorn <maarten@zuidhoorn.com>
* Update ui/components/multichain/account-details/account-details-display.js
Co-authored-by: Maarten Zuidhoorn <maarten@zuidhoorn.com>
* Update ui/pages/keyring-snaps/snap-account-detail-page/header.tsx
Co-authored-by: Maarten Zuidhoorn <maarten@zuidhoorn.com>
* Update ui/pages/keyring-snaps/snap-account-detail-page/snap-account-detail-page.tsx
Co-authored-by: Maarten Zuidhoorn <maarten@zuidhoorn.com>
* fix: rename and added jsdoc
* fix: add fence to snap label
* fix: remove comment
* fix: change pixel to int and remove unused class
* fix: lint
* fix: create two tests for main and flask restricted methods
* fix: remove fence in test
* fix: lint header
* feat: allow `metamask.github.io` in manifest
* fix: remove comment
* fix: rename isAbleToExportAccount
* chore: use a more restrictive registry URL
* fix: change to && not ||
* fix: remove unused
* fix: move keyring snaps URL to Flask's base manifest
* fix: use fetch instead of fetchWithCache
* fix: lint
---------
Co-authored-by: kumavis <aaron@kumavis.me>
Co-authored-by: Howard Braham <howrad@gmail.com>
Co-authored-by: Daniel Rocha <68558152+danroc@users.noreply.github.com>
Co-authored-by: Gustavo Antunes <17601467+gantunesr@users.noreply.github.com>
Co-authored-by: Nidhi Kumari <nidhi.kumari@consensys.net>
Co-authored-by: Mark Stacey <markjstacey@gmail.com>
Co-authored-by: MetaMask Bot <metamaskbot@users.noreply.github.com>
Co-authored-by: Gauthier Petetin <gauthierpetetin@hotmail.com>
Co-authored-by: Brad Decker <bhdecker84@gmail.com>
Co-authored-by: weizman <weizmangal@gmail.com>
Co-authored-by: Ariella Vu <20778143+digiwand@users.noreply.github.com>
Co-authored-by: Dhruv <79097544+dhruvv173@users.noreply.github.com>
Co-authored-by: ryanml <ryanlanese@gmail.com>
Co-authored-by: Alex Donesky <adonesky@gmail.com>
Co-authored-by: David Walsh <davidwalsh83@gmail.com>
Co-authored-by: George Marshall <george.marshall@consensys.net>
Co-authored-by: Frederik Bolding <frederik.bolding@gmail.com>
Co-authored-by: jiexi <jiexiluan@gmail.com>
Co-authored-by: jainex <jainexp017@gmail.com>
Co-authored-by: Matthias Kretschmann <m@kretschmann.io>
Co-authored-by: Garrett Bear <gwhisten@gmail.com>
Co-authored-by: Ujwal Kumar <ujwalkumar95@gmail.com>
Co-authored-by: rohit kerkar <129620973+rohiiittttt@users.noreply.github.com>
Co-authored-by: Harsh Shukla <125105825+PrgrmrHarshShukla@users.noreply.github.com>
Co-authored-by: Danica Shen <zhaodanica@gmail.com>
Co-authored-by: Albert Olivé <albertolivecorbella@gmail.com>
Co-authored-by: Maarten Zuidhoorn <maarten@zuidhoorn.com>
2023-06-29 15:24:08 +02:00
|
|
|
///: BEGIN:ONLY_INCLUDE_IN(keyring-snaps)
|
|
|
|
export function getsnapsAddSnapAccountModalDismissed(state) {
|
|
|
|
const { snapsAddSnapAccountModalDismissed } = state.metamask;
|
|
|
|
|
|
|
|
return snapsAddSnapAccountModalDismissed;
|
|
|
|
}
|
|
|
|
|
|
|
|
export function getSnapRegistry(state) {
|
|
|
|
const { snapRegistryList } = state.metamask;
|
|
|
|
return snapRegistryList;
|
|
|
|
}
|
|
|
|
///: END:ONLY_INCLUDE_IN
|