2017-09-11 23:30:30 +02:00
|
|
|
const fs = require('fs')
|
|
|
|
const path = require('path')
|
|
|
|
const pump = require('pump')
|
2018-10-02 02:00:40 +02:00
|
|
|
const querystring = require('querystring')
|
2016-08-11 23:04:20 +02:00
|
|
|
const LocalMessageDuplexStream = require('post-message-stream')
|
2016-10-12 21:35:55 +02:00
|
|
|
const PongStream = require('ping-pong-stream/pong')
|
2017-09-11 23:30:30 +02:00
|
|
|
const ObjectMultiplex = require('obj-multiplex')
|
2017-03-31 03:30:24 +02:00
|
|
|
const extension = require('extensionizer')
|
2018-08-21 00:39:03 +02:00
|
|
|
const PortStream = require('extension-port-stream')
|
2016-05-06 01:04:43 +02:00
|
|
|
|
2018-03-29 06:29:57 +02:00
|
|
|
const inpageContent = fs.readFileSync(path.join(__dirname, '..', '..', 'dist', 'chrome', 'inpage.js')).toString()
|
|
|
|
const inpageSuffix = '//# sourceURL=' + extension.extension.getURL('inpage.js') + '\n'
|
2017-10-12 21:51:48 +02:00
|
|
|
const inpageBundle = inpageContent + inpageSuffix
|
2016-07-26 01:34:29 +02:00
|
|
|
|
|
|
|
// Eventually this streaming injection could be replaced with:
|
|
|
|
// https://developer.mozilla.org/en-US/docs/Mozilla/Tech/XPCOM/Language_Bindings/Components.utils.exportFunction
|
|
|
|
//
|
|
|
|
// But for now that is only Firefox
|
|
|
|
// If we create a FireFox-only code path using that API,
|
|
|
|
// MetaMask will be much faster loading and performant on Firefox.
|
|
|
|
|
2016-06-24 20:21:22 +02:00
|
|
|
if (shouldInjectWeb3()) {
|
|
|
|
setupInjection()
|
2016-07-07 06:45:15 +02:00
|
|
|
setupStreams()
|
2016-06-24 20:21:22 +02:00
|
|
|
}
|
|
|
|
|
2018-04-18 23:02:08 +02:00
|
|
|
/**
|
|
|
|
* Creates a script tag that injects inpage.js
|
|
|
|
*/
|
2016-11-11 19:26:12 +01:00
|
|
|
function setupInjection () {
|
2016-07-25 22:46:33 +02:00
|
|
|
try {
|
|
|
|
// inject in-page script
|
|
|
|
var scriptTag = document.createElement('script')
|
2017-10-12 21:51:48 +02:00
|
|
|
scriptTag.textContent = inpageBundle
|
2016-07-25 22:46:33 +02:00
|
|
|
scriptTag.onload = function () { this.parentNode.removeChild(this) }
|
|
|
|
var container = document.head || document.documentElement
|
|
|
|
// append as first child
|
|
|
|
container.insertBefore(scriptTag, container.children[0])
|
|
|
|
} catch (e) {
|
|
|
|
console.error('Metamask injection failed.', e)
|
|
|
|
}
|
2016-07-07 05:20:40 +02:00
|
|
|
}
|
|
|
|
|
2018-04-18 23:02:08 +02:00
|
|
|
/**
|
|
|
|
* Sets up two-way communication streams between the
|
|
|
|
* browser extension and local per-page browser context
|
|
|
|
*/
|
2016-11-11 19:26:12 +01:00
|
|
|
function setupStreams () {
|
2016-06-24 20:21:22 +02:00
|
|
|
// setup communication to page and plugin
|
2017-08-04 00:05:32 +02:00
|
|
|
const pageStream = new LocalMessageDuplexStream({
|
2016-06-24 20:21:22 +02:00
|
|
|
name: 'contentscript',
|
|
|
|
target: 'inpage',
|
|
|
|
})
|
2017-08-04 00:05:32 +02:00
|
|
|
const pluginPort = extension.runtime.connect({ name: 'contentscript' })
|
|
|
|
const pluginStream = new PortStream(pluginPort)
|
2016-06-24 20:21:22 +02:00
|
|
|
|
|
|
|
// forward communication plugin->inpage
|
2017-09-22 02:37:30 +02:00
|
|
|
pump(
|
|
|
|
pageStream,
|
|
|
|
pluginStream,
|
|
|
|
pageStream,
|
|
|
|
(err) => logStreamDisconnectWarning('MetaMask Contentscript Forwarding', err)
|
|
|
|
)
|
2016-06-24 20:21:22 +02:00
|
|
|
|
2016-10-12 21:35:55 +02:00
|
|
|
// setup local multistream channels
|
2017-09-11 23:30:30 +02:00
|
|
|
const mux = new ObjectMultiplex()
|
2017-09-22 02:37:30 +02:00
|
|
|
mux.setMaxListeners(25)
|
|
|
|
|
2017-09-11 23:30:30 +02:00
|
|
|
pump(
|
|
|
|
mux,
|
|
|
|
pageStream,
|
|
|
|
mux,
|
|
|
|
(err) => logStreamDisconnectWarning('MetaMask Inpage', err)
|
|
|
|
)
|
|
|
|
pump(
|
|
|
|
mux,
|
|
|
|
pluginStream,
|
|
|
|
mux,
|
|
|
|
(err) => logStreamDisconnectWarning('MetaMask Background', err)
|
|
|
|
)
|
2016-10-12 21:35:55 +02:00
|
|
|
|
|
|
|
// connect ping stream
|
2017-08-04 00:05:32 +02:00
|
|
|
const pongStream = new PongStream({ objectMode: true })
|
2017-09-11 23:30:30 +02:00
|
|
|
pump(
|
|
|
|
mux,
|
|
|
|
pongStream,
|
|
|
|
mux,
|
|
|
|
(err) => logStreamDisconnectWarning('MetaMask PingPongStream', err)
|
|
|
|
)
|
2016-10-12 21:35:55 +02:00
|
|
|
|
2017-08-04 00:05:32 +02:00
|
|
|
// connect phishing warning stream
|
2017-09-11 23:30:30 +02:00
|
|
|
const phishingStream = mux.createStream('phishing')
|
2017-08-04 00:05:32 +02:00
|
|
|
phishingStream.once('data', redirectToPhishingWarning)
|
|
|
|
|
|
|
|
// ignore unused channels (handled by background, inpage)
|
2017-09-11 23:30:30 +02:00
|
|
|
mux.ignoreStream('provider')
|
|
|
|
mux.ignoreStream('publicConfig')
|
|
|
|
}
|
|
|
|
|
2018-04-18 23:02:08 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Error handler for page to plugin stream disconnections
|
|
|
|
*
|
|
|
|
* @param {string} remoteLabel Remote stream name
|
|
|
|
* @param {Error} err Stream connection error
|
|
|
|
*/
|
2017-09-11 23:30:30 +02:00
|
|
|
function logStreamDisconnectWarning (remoteLabel, err) {
|
|
|
|
let warningMsg = `MetamaskContentscript - lost connection to ${remoteLabel}`
|
|
|
|
if (err) warningMsg += '\n' + err.stack
|
|
|
|
console.warn(warningMsg)
|
2016-06-24 20:21:22 +02:00
|
|
|
}
|
|
|
|
|
2018-04-18 23:02:08 +02:00
|
|
|
/**
|
|
|
|
* Determines if Web3 should be injected
|
|
|
|
*
|
2018-04-19 21:12:04 +02:00
|
|
|
* @returns {boolean} {@code true} if Web3 should be injected
|
2018-04-18 23:02:08 +02:00
|
|
|
*/
|
2016-11-11 19:26:12 +01:00
|
|
|
function shouldInjectWeb3 () {
|
2018-07-03 00:49:33 +02:00
|
|
|
return doctypeCheck() && suffixCheck() &&
|
|
|
|
documentElementCheck() && !blacklistedDomainCheck()
|
2016-10-16 00:33:49 +02:00
|
|
|
}
|
|
|
|
|
2018-04-18 23:02:08 +02:00
|
|
|
/**
|
|
|
|
* Checks the doctype of the current document if it exists
|
|
|
|
*
|
2018-04-19 21:12:04 +02:00
|
|
|
* @returns {boolean} {@code true} if the doctype is html or if none exists
|
2018-04-18 23:02:08 +02:00
|
|
|
*/
|
2017-03-28 20:30:39 +02:00
|
|
|
function doctypeCheck () {
|
2017-03-22 19:25:56 +01:00
|
|
|
const doctype = window.document.doctype
|
|
|
|
if (doctype) {
|
|
|
|
return doctype.name === 'html'
|
|
|
|
} else {
|
2017-12-05 12:25:35 +01:00
|
|
|
return true
|
2016-10-16 00:33:49 +02:00
|
|
|
}
|
2016-07-21 19:45:32 +02:00
|
|
|
}
|
2017-03-28 20:30:39 +02:00
|
|
|
|
2018-04-18 23:02:08 +02:00
|
|
|
/**
|
2018-10-16 02:26:51 +02:00
|
|
|
* Returns whether or not the extension (suffix) of the current document is prohibited
|
2018-04-18 23:02:08 +02:00
|
|
|
*
|
2018-10-16 02:26:51 +02:00
|
|
|
* This checks {@code window.location.pathname} against a set of file extensions
|
|
|
|
* that should not have web3 injected into them. This check is indifferent of query parameters
|
|
|
|
* in the location.
|
|
|
|
*
|
|
|
|
* @returns {boolean} whether or not the extension of the current document is prohibited
|
2018-04-18 23:02:08 +02:00
|
|
|
*/
|
2017-04-27 06:05:45 +02:00
|
|
|
function suffixCheck () {
|
2018-10-16 02:26:51 +02:00
|
|
|
const prohibitedTypes = [
|
|
|
|
/\.xml$/,
|
|
|
|
/\.pdf$/,
|
|
|
|
]
|
|
|
|
const currentUrl = window.location.pathname
|
2017-03-28 20:30:39 +02:00
|
|
|
for (let i = 0; i < prohibitedTypes.length; i++) {
|
2018-10-16 02:26:51 +02:00
|
|
|
if (prohibitedTypes[i].test(currentUrl)) {
|
2017-03-28 20:30:39 +02:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
2017-08-04 00:05:32 +02:00
|
|
|
|
2018-04-18 23:02:08 +02:00
|
|
|
/**
|
|
|
|
* Checks the documentElement of the current document
|
|
|
|
*
|
2018-04-19 21:12:04 +02:00
|
|
|
* @returns {boolean} {@code true} if the documentElement is an html node or if none exists
|
2018-04-18 23:02:08 +02:00
|
|
|
*/
|
2017-12-05 12:25:35 +01:00
|
|
|
function documentElementCheck () {
|
|
|
|
var documentElement = document.documentElement.nodeName
|
|
|
|
if (documentElement) {
|
|
|
|
return documentElement.toLowerCase() === 'html'
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2018-04-18 23:02:08 +02:00
|
|
|
/**
|
|
|
|
* Checks if the current domain is blacklisted
|
2018-05-18 15:43:27 +02:00
|
|
|
*
|
2018-04-19 21:12:04 +02:00
|
|
|
* @returns {boolean} {@code true} if the current domain is blacklisted
|
2018-04-18 23:02:08 +02:00
|
|
|
*/
|
2018-03-16 06:50:34 +01:00
|
|
|
function blacklistedDomainCheck () {
|
2018-04-04 05:33:19 +02:00
|
|
|
var blacklistedDomains = [
|
|
|
|
'uscourts.gov',
|
|
|
|
'dropbox.com',
|
|
|
|
'webbyawards.com',
|
2018-04-30 23:35:47 +02:00
|
|
|
'cdn.shopify.com/s/javascripts/tricorder/xtld-read-only-frame.html',
|
2018-05-18 16:11:46 +02:00
|
|
|
'adyen.com',
|
2018-06-04 04:38:47 +02:00
|
|
|
'gravityforms.com',
|
2018-07-12 23:21:32 +02:00
|
|
|
'harbourair.com',
|
2018-07-19 00:23:32 +02:00
|
|
|
'ani.gamer.com.tw',
|
2018-07-17 00:39:35 +02:00
|
|
|
'blueskybooking.com',
|
2018-04-04 05:33:19 +02:00
|
|
|
]
|
2018-03-16 06:50:34 +01:00
|
|
|
var currentUrl = window.location.href
|
|
|
|
var currentRegex
|
|
|
|
for (let i = 0; i < blacklistedDomains.length; i++) {
|
|
|
|
const blacklistedDomain = blacklistedDomains[i].replace('.', '\\.')
|
|
|
|
currentRegex = new RegExp(`(?:https?:\\/\\/)(?:(?!${blacklistedDomain}).)*$`)
|
|
|
|
if (!currentRegex.test(currentUrl)) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2018-04-18 23:02:08 +02:00
|
|
|
/**
|
|
|
|
* Redirects the current page to a phishing information page
|
|
|
|
*/
|
2017-08-04 00:05:32 +02:00
|
|
|
function redirectToPhishingWarning () {
|
2018-07-25 17:37:04 +02:00
|
|
|
console.log('MetaMask - routing to Phishing Warning component')
|
2018-07-30 23:50:05 +02:00
|
|
|
const extensionURL = extension.runtime.getURL('phishing.html')
|
2018-10-02 02:00:40 +02:00
|
|
|
window.location.href = `${extensionURL}#${querystring.stringify({
|
|
|
|
hostname: window.location.hostname,
|
|
|
|
href: window.location.href,
|
|
|
|
})}`
|
2017-08-04 00:05:32 +02:00
|
|
|
}
|