2018-04-20 19:40:53 +02:00
|
|
|
/**
|
2018-04-19 20:23:15 +02:00
|
|
|
* @file The entry point for the web extension singleton process.
|
|
|
|
*/
|
2018-10-15 07:14:25 +02:00
|
|
|
|
2023-02-14 17:06:19 +01:00
|
|
|
import EventEmitter from 'events';
|
2021-02-04 19:15:23 +01:00
|
|
|
import endOfStream from 'end-of-stream';
|
|
|
|
import pump from 'pump';
|
|
|
|
import debounce from 'debounce-stream';
|
|
|
|
import log from 'loglevel';
|
2022-03-18 20:07:05 +01:00
|
|
|
import browser from 'webextension-polyfill';
|
2022-10-11 00:10:44 +02:00
|
|
|
import { storeAsStream } from '@metamask/obs-store';
|
2023-05-10 07:36:01 +02:00
|
|
|
///: BEGIN:ONLY_INCLUDE_IN(snaps)
|
|
|
|
import { ApprovalType } from '@metamask/controller-utils';
|
|
|
|
///: END:ONLY_INCLUDE_IN
|
2021-02-04 19:15:23 +01:00
|
|
|
import PortStream from 'extension-port-stream';
|
2021-01-20 17:13:14 +01:00
|
|
|
|
2022-01-03 21:39:41 +01:00
|
|
|
import { ethErrors } from 'eth-rpc-errors';
|
2021-01-20 17:13:14 +01:00
|
|
|
import {
|
|
|
|
ENVIRONMENT_TYPE_POPUP,
|
|
|
|
ENVIRONMENT_TYPE_NOTIFICATION,
|
|
|
|
ENVIRONMENT_TYPE_FULLSCREEN,
|
2022-11-14 18:18:08 +01:00
|
|
|
EXTENSION_MESSAGES,
|
2022-03-09 16:15:07 +01:00
|
|
|
PLATFORM_FIREFOX,
|
2021-02-04 19:15:23 +01:00
|
|
|
} from '../../shared/constants/app';
|
2021-11-15 17:13:51 +01:00
|
|
|
import {
|
2023-04-03 17:31:04 +02:00
|
|
|
REJECT_NOTIFICATION_CLOSE,
|
|
|
|
REJECT_NOTIFICATION_CLOSE_SIG,
|
|
|
|
MetaMetricsEventCategory,
|
|
|
|
MetaMetricsEventName,
|
|
|
|
MetaMetricsUserTrait,
|
2021-11-15 17:13:51 +01:00
|
|
|
} from '../../shared/constants/metametrics';
|
2022-11-14 18:18:08 +01:00
|
|
|
import { checkForLastErrorAndLog } from '../../shared/modules/browser-runtime.utils';
|
2022-05-26 06:48:23 +02:00
|
|
|
import { isManifestV3 } from '../../shared/modules/mv3.utils';
|
2022-07-22 22:39:48 +02:00
|
|
|
import { maskObject } from '../../shared/modules/object.utils';
|
2023-05-03 17:39:56 +02:00
|
|
|
import { getEnvironmentType, deferredPromise, getPlatform } from './lib/util';
|
2021-02-04 19:15:23 +01:00
|
|
|
import migrations from './migrations';
|
|
|
|
import Migrator from './lib/migrator';
|
|
|
|
import ExtensionPlatform from './platforms/extension';
|
|
|
|
import LocalStore from './lib/local-store';
|
|
|
|
import ReadOnlyNetworkStore from './lib/network-store';
|
2022-07-22 22:39:48 +02:00
|
|
|
import { SENTRY_STATE } from './lib/setupSentry';
|
|
|
|
|
2021-02-04 19:15:23 +01:00
|
|
|
import createStreamSink from './lib/createStreamSink';
|
2021-11-15 17:13:51 +01:00
|
|
|
import NotificationManager, {
|
|
|
|
NOTIFICATION_MANAGER_EVENTS,
|
|
|
|
} from './lib/notification-manager';
|
2021-02-09 00:22:30 +01:00
|
|
|
import MetamaskController, {
|
|
|
|
METAMASK_CONTROLLER_EVENTS,
|
|
|
|
} from './metamask-controller';
|
2021-02-04 19:15:23 +01:00
|
|
|
import rawFirstTimeState from './first-time-state';
|
|
|
|
import getFirstPreferredLangCode from './lib/get-first-preferred-lang-code';
|
|
|
|
import getObjStructure from './lib/getObjStructure';
|
|
|
|
import setupEnsIpfsResolver from './lib/ens-ipfs/setup';
|
2023-03-02 17:50:00 +01:00
|
|
|
|
2020-08-19 18:27:05 +02:00
|
|
|
/* eslint-enable import/first */
|
2018-01-17 23:04:37 +01:00
|
|
|
|
2023-02-20 18:13:12 +01:00
|
|
|
/* eslint-disable import/order */
|
2023-04-25 16:32:51 +02:00
|
|
|
///: BEGIN:ONLY_INCLUDE_IN(desktop)
|
2023-02-20 18:13:12 +01:00
|
|
|
import {
|
|
|
|
CONNECTION_TYPE_EXTERNAL,
|
|
|
|
CONNECTION_TYPE_INTERNAL,
|
|
|
|
} from '@metamask/desktop/dist/constants';
|
|
|
|
import DesktopManager from '@metamask/desktop/dist/desktop-manager';
|
|
|
|
///: END:ONLY_INCLUDE_IN
|
|
|
|
/* eslint-enable import/order */
|
|
|
|
|
2021-02-04 19:15:23 +01:00
|
|
|
const { sentry } = global;
|
|
|
|
const firstTimeState = { ...rawFirstTimeState };
|
2018-06-11 20:04:28 +02:00
|
|
|
|
2022-05-26 06:48:23 +02:00
|
|
|
const metamaskInternalProcessHash = {
|
|
|
|
[ENVIRONMENT_TYPE_POPUP]: true,
|
|
|
|
[ENVIRONMENT_TYPE_NOTIFICATION]: true,
|
|
|
|
[ENVIRONMENT_TYPE_FULLSCREEN]: true,
|
|
|
|
};
|
|
|
|
|
|
|
|
const metamaskBlockedPorts = ['trezor-connect'];
|
|
|
|
|
2021-07-30 15:02:48 +02:00
|
|
|
log.setDefaultLevel(process.env.METAMASK_DEBUG ? 'debug' : 'info');
|
2017-02-23 23:23:45 +01:00
|
|
|
|
2021-02-04 19:15:23 +01:00
|
|
|
const platform = new ExtensionPlatform();
|
|
|
|
const notificationManager = new NotificationManager();
|
2017-03-31 03:33:19 +02:00
|
|
|
|
2021-02-04 19:15:23 +01:00
|
|
|
let popupIsOpen = false;
|
|
|
|
let notificationIsOpen = false;
|
2021-02-11 23:07:56 +01:00
|
|
|
let uiIsTriggering = false;
|
2021-02-04 19:15:23 +01:00
|
|
|
const openMetamaskTabsIDs = {};
|
2023-05-03 17:39:56 +02:00
|
|
|
const openMetamaskConnections = new Map();
|
2021-02-04 19:15:23 +01:00
|
|
|
const requestAccountTabIds = {};
|
2022-08-11 19:33:33 +02:00
|
|
|
let controller;
|
2016-08-12 04:44:59 +02:00
|
|
|
|
2017-01-12 10:17:05 +01:00
|
|
|
// state persistence
|
2021-12-02 19:16:46 +01:00
|
|
|
const inTest = process.env.IN_TEST;
|
2021-02-04 19:15:23 +01:00
|
|
|
const localStore = inTest ? new ReadOnlyNetworkStore() : new LocalStore();
|
|
|
|
let versionedData;
|
2017-01-12 10:17:05 +01:00
|
|
|
|
2020-01-17 23:59:25 +01:00
|
|
|
if (inTest || process.env.METAMASK_DEBUG) {
|
2022-11-09 20:28:32 +01:00
|
|
|
global.stateHooks.metamaskGetState = localStore.get.bind(localStore);
|
2020-01-17 23:59:25 +01:00
|
|
|
}
|
|
|
|
|
2022-05-16 23:16:10 +02:00
|
|
|
const phishingPageUrl = new URL(process.env.PHISHING_WARNING_PAGE_URL);
|
2022-05-06 00:28:48 +02:00
|
|
|
|
|
|
|
const ONE_SECOND_IN_MILLISECONDS = 1_000;
|
|
|
|
// Timeout for initializing phishing warning page.
|
|
|
|
const PHISHING_WARNING_PAGE_TIMEOUT = ONE_SECOND_IN_MILLISECONDS;
|
|
|
|
|
2022-11-03 18:25:13 +01:00
|
|
|
const ACK_KEEP_ALIVE_MESSAGE = 'ACK_KEEP_ALIVE_MESSAGE';
|
|
|
|
const WORKER_KEEP_ALIVE_MESSAGE = 'WORKER_KEEP_ALIVE_MESSAGE';
|
|
|
|
|
2023-04-25 16:32:51 +02:00
|
|
|
///: BEGIN:ONLY_INCLUDE_IN(desktop)
|
2023-02-20 18:13:12 +01:00
|
|
|
const OVERRIDE_ORIGIN = {
|
|
|
|
EXTENSION: 'EXTENSION',
|
|
|
|
DESKTOP: 'DESKTOP_APP',
|
|
|
|
};
|
|
|
|
///: END:ONLY_INCLUDE_IN
|
|
|
|
|
2023-02-14 17:06:19 +01:00
|
|
|
// Event emitter for state persistence
|
|
|
|
export const statePersistenceEvents = new EventEmitter();
|
|
|
|
|
2022-05-26 06:48:23 +02:00
|
|
|
/**
|
2022-11-24 14:32:05 +01:00
|
|
|
* This deferred Promise is used to track whether initialization has finished.
|
2022-11-14 18:18:08 +01:00
|
|
|
*
|
2022-11-24 14:32:05 +01:00
|
|
|
* It is very important to ensure that `resolveInitialization` is *always*
|
|
|
|
* called once initialization has completed, and that `rejectInitialization` is
|
|
|
|
* called if initialization fails in an unrecoverable way.
|
2022-05-26 06:48:23 +02:00
|
|
|
*/
|
2022-11-24 14:32:05 +01:00
|
|
|
const {
|
|
|
|
promise: isInitialized,
|
|
|
|
resolve: resolveInitialization,
|
|
|
|
reject: rejectInitialization,
|
|
|
|
} = deferredPromise();
|
2022-05-26 06:48:23 +02:00
|
|
|
|
2022-11-14 18:18:08 +01:00
|
|
|
/**
|
|
|
|
* Sends a message to the dapp(s) content script to signal it can connect to MetaMask background as
|
|
|
|
* the backend is not active. It is required to re-connect dapps after service worker re-activates.
|
|
|
|
* For non-dapp pages, the message will be sent and ignored.
|
|
|
|
*/
|
|
|
|
const sendReadyMessageToTabs = async () => {
|
|
|
|
const tabs = await browser.tabs
|
|
|
|
.query({
|
|
|
|
/**
|
|
|
|
* Only query tabs that our extension can run in. To do this, we query for all URLs that our
|
|
|
|
* extension can inject scripts in, which is by using the "<all_urls>" value and __without__
|
|
|
|
* the "tabs" manifest permission. If we included the "tabs" permission, this would also fetch
|
|
|
|
* URLs that we'd not be able to inject in, e.g. chrome://pages, chrome://extension, which
|
|
|
|
* is not what we'd want.
|
|
|
|
*
|
|
|
|
* You might be wondering, how does the "url" param work without the "tabs" permission?
|
|
|
|
*
|
|
|
|
* @see {@link https://bugs.chromium.org/p/chromium/issues/detail?id=661311#c1}
|
|
|
|
* "If the extension has access to inject scripts into Tab, then we can return the url
|
|
|
|
* of Tab (because the extension could just inject a script to message the location.href)."
|
|
|
|
*/
|
|
|
|
url: '<all_urls>',
|
|
|
|
windowType: 'normal',
|
|
|
|
})
|
|
|
|
.then((result) => {
|
|
|
|
checkForLastErrorAndLog();
|
|
|
|
return result;
|
|
|
|
})
|
|
|
|
.catch(() => {
|
|
|
|
checkForLastErrorAndLog();
|
|
|
|
});
|
|
|
|
|
|
|
|
/** @todo we should only sendMessage to dapp tabs, not all tabs. */
|
|
|
|
for (const tab of tabs) {
|
|
|
|
browser.tabs
|
|
|
|
.sendMessage(tab.id, {
|
|
|
|
name: EXTENSION_MESSAGES.READY,
|
|
|
|
})
|
|
|
|
.then(() => {
|
|
|
|
checkForLastErrorAndLog();
|
|
|
|
})
|
|
|
|
.catch(() => {
|
|
|
|
// An error may happen if the contentscript is blocked from loading,
|
|
|
|
// and thus there is no runtime.onMessage handler to listen to the message.
|
|
|
|
checkForLastErrorAndLog();
|
|
|
|
});
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2022-11-24 14:32:05 +01:00
|
|
|
// These are set after initialization
|
|
|
|
let connectRemote;
|
|
|
|
let connectExternal;
|
|
|
|
|
|
|
|
browser.runtime.onConnect.addListener(async (...args) => {
|
|
|
|
// Queue up connection attempts here, waiting until after initialization
|
|
|
|
await isInitialized;
|
2023-05-03 17:39:56 +02:00
|
|
|
const remotePort = args[0];
|
|
|
|
const { sender } = remotePort;
|
|
|
|
|
|
|
|
const url = sender?.url;
|
|
|
|
const detectedProcessName = url ? getEnvironmentType(url) : '';
|
|
|
|
|
|
|
|
const connectionId = generateConnectionId(remotePort, detectedProcessName);
|
|
|
|
const openConnections = openMetamaskConnections.get(connectionId) || 0;
|
|
|
|
|
|
|
|
if (
|
|
|
|
openConnections === 0 ||
|
|
|
|
(detectedProcessName === 'background' && openConnections < 2)
|
|
|
|
// 2 background connections are allowed, one for phishing warning page and one for the ledger bridge keyring
|
|
|
|
) {
|
|
|
|
// This is set in `setupController`, which is called as part of initialization
|
|
|
|
connectRemote(...args);
|
|
|
|
openMetamaskConnections.set(connectionId, openConnections + 1);
|
|
|
|
} else {
|
|
|
|
throw new Error('CONNECTION_ALREADY_EXISTS');
|
|
|
|
}
|
2022-11-24 14:32:05 +01:00
|
|
|
});
|
2023-05-03 17:39:56 +02:00
|
|
|
|
2022-11-24 14:32:05 +01:00
|
|
|
browser.runtime.onConnectExternal.addListener(async (...args) => {
|
|
|
|
// Queue up connection attempts here, waiting until after initialization
|
|
|
|
await isInitialized;
|
|
|
|
|
|
|
|
// This is set in `setupController`, which is called as part of initialization
|
|
|
|
connectExternal(...args);
|
|
|
|
});
|
|
|
|
|
2018-04-20 19:39:31 +02:00
|
|
|
/**
|
2021-03-19 22:54:30 +01:00
|
|
|
* @typedef {import('../../shared/constants/transaction').TransactionMeta} TransactionMeta
|
2018-04-20 19:39:31 +02:00
|
|
|
*/
|
|
|
|
|
2018-04-20 19:40:53 +02:00
|
|
|
/**
|
2018-04-20 19:41:41 +02:00
|
|
|
* The data emitted from the MetaMaskController.store EventEmitter, also used to initialize the MetaMaskController. Available in UI on React state as state.metamask.
|
2022-01-07 16:57:33 +01:00
|
|
|
*
|
2018-04-19 20:23:15 +02:00
|
|
|
* @typedef MetaMaskState
|
2018-04-20 19:39:31 +02:00
|
|
|
* @property {boolean} isInitialized - Whether the first vault has been created.
|
|
|
|
* @property {boolean} isUnlocked - Whether the vault is currently decrypted and accounts are available for selection.
|
|
|
|
* @property {boolean} isAccountMenuOpen - Represents whether the main account selection UI is currently displayed.
|
2023-04-13 18:54:03 +02:00
|
|
|
* @property {boolean} isNetworkMenuOpen - Represents whether the main network selection UI is currently displayed.
|
2022-07-27 15:28:05 +02:00
|
|
|
* @property {object} identities - An object matching lower-case hex addresses to Identity objects with "address" and "name" (nickname) keys.
|
|
|
|
* @property {object} unapprovedTxs - An object mapping transaction hashes to unapproved transactions.
|
2023-03-09 22:00:28 +01:00
|
|
|
* @property {object} networkConfigurations - A list of network configurations, containing RPC provider details (eg chainId, rpcUrl, rpcPreferences).
|
2018-04-20 19:39:31 +02:00
|
|
|
* @property {Array} addressBook - A list of previously sent to addresses.
|
2022-07-27 15:28:05 +02:00
|
|
|
* @property {object} contractExchangeRates - Info about current token prices.
|
2018-04-20 19:39:31 +02:00
|
|
|
* @property {Array} tokens - Tokens held by the current user, including their balances.
|
2022-07-27 15:28:05 +02:00
|
|
|
* @property {object} send - TODO: Document
|
2018-04-20 19:39:31 +02:00
|
|
|
* @property {boolean} useBlockie - Indicates preferred user identicon format. True for blockie, false for Jazzicon.
|
2022-07-27 15:28:05 +02:00
|
|
|
* @property {object} featureFlags - An object for optional feature flags.
|
2018-04-20 19:39:31 +02:00
|
|
|
* @property {boolean} welcomeScreen - True if welcome screen should be shown.
|
|
|
|
* @property {string} currentLocale - A locale string matching the user's preferred display language.
|
2023-05-02 17:53:20 +02:00
|
|
|
* @property {object} providerConfig - The current selected network provider.
|
|
|
|
* @property {string} providerConfig.rpcUrl - The address for the RPC API, if using an RPC API.
|
|
|
|
* @property {string} providerConfig.type - An identifier for the type of network selected, allows MetaMask to use custom provider strategies for known networks.
|
NetworkController: Split `network` into `networkId` and `networkStatus` (#17556)
The `network` store of the network controller crams two types of data
into one place. It roughly tracks whether we have enough information to
make requests to the network and whether the network is capable of
receiving requests, but it also stores the ID of the network (as
obtained via `net_version`).
Generally we shouldn't be using the network ID for anything, as it has
been completely replaced by chain ID, which all custom RPC endpoints
have been required to support for over a year now. However, as the
network ID is used in various places within the extension codebase,
removing it entirely would be a non-trivial effort. So, minimally, this
commit splits `network` into two stores: `networkId` and
`networkStatus`. But it also expands the concept of network status.
Previously, the network was in one of two states: "loading" and
"not-loading". But now it can be in one of four states:
- `available`: The network is able to receive and respond to requests.
- `unavailable`: The network is not able to receive and respond to
requests for unknown reasons.
- `blocked`: The network is actively blocking requests based on the
user's geolocation. (This is specific to Infura.)
- `unknown`: We don't know whether the network can receive and respond
to requests, either because we haven't checked or we tried to check
and were unsuccessful.
This commit also changes how the network status is determined —
specifically, how many requests are used to determine that status, when
they occur, and whether they are awaited. Previously, the network
controller would make 2 to 3 requests during the course of running
`lookupNetwork`.
* First, if it was an Infura network, it would make a request for
`eth_blockNumber` to determine whether Infura was blocking requests or
not, then emit an appropriate event. This operation was not awaited.
* Then, regardless of the network, it would fetch the network ID via
`net_version`. This operation was awaited.
* Finally, regardless of the network, it would fetch the latest block
via `eth_getBlockByNumber`, then use the result to determine whether
the network supported EIP-1559. This operation was awaited.
Now:
* One fewer request is made, specifically `eth_blockNumber`, as we don't
need to make an extra request to determine whether Infura is blocking
requests; we can reuse `eth_getBlockByNumber`;
* All requests are awaited, which makes `lookupNetwork` run fully
in-band instead of partially out-of-band; and
* Both requests for `net_version` and `eth_getBlockByNumber` are
performed in parallel to make `lookupNetwork` run slightly faster.
2023-03-31 00:49:12 +02:00
|
|
|
* @property {string} networkId - The stringified number of the current network ID.
|
|
|
|
* @property {string} networkStatus - Either "unknown", "available", "unavailable", or "blocked", depending on the status of the currently selected network.
|
2022-07-27 15:28:05 +02:00
|
|
|
* @property {object} accounts - An object mapping lower-case hex addresses to objects with "balance" and "address" keys, both storing hex string values.
|
2018-04-20 19:39:31 +02:00
|
|
|
* @property {hex} currentBlockGasLimit - The most recently seen block gas limit, in a lower case hex prefixed string.
|
2020-03-06 22:34:56 +01:00
|
|
|
* @property {TransactionMeta[]} currentNetworkTxList - An array of transactions associated with the currently selected network.
|
2022-07-27 15:28:05 +02:00
|
|
|
* @property {object} unapprovedMsgs - An object of messages pending approval, mapping a unique ID to the options.
|
2018-04-20 19:39:31 +02:00
|
|
|
* @property {number} unapprovedMsgCount - The number of messages in unapprovedMsgs.
|
2022-07-27 15:28:05 +02:00
|
|
|
* @property {object} unapprovedPersonalMsgs - An object of messages pending approval, mapping a unique ID to the options.
|
2018-04-20 19:39:31 +02:00
|
|
|
* @property {number} unapprovedPersonalMsgCount - The number of messages in unapprovedPersonalMsgs.
|
2022-07-27 15:28:05 +02:00
|
|
|
* @property {object} unapprovedEncryptionPublicKeyMsgs - An object of messages pending approval, mapping a unique ID to the options.
|
2020-02-19 19:24:16 +01:00
|
|
|
* @property {number} unapprovedEncryptionPublicKeyMsgCount - The number of messages in EncryptionPublicKeyMsgs.
|
2022-07-27 15:28:05 +02:00
|
|
|
* @property {object} unapprovedDecryptMsgs - An object of messages pending approval, mapping a unique ID to the options.
|
2020-02-19 19:24:16 +01:00
|
|
|
* @property {number} unapprovedDecryptMsgCount - The number of messages in unapprovedDecryptMsgs.
|
2022-07-27 15:28:05 +02:00
|
|
|
* @property {object} unapprovedTypedMsgs - An object of messages pending approval, mapping a unique ID to the options.
|
2018-04-20 19:39:31 +02:00
|
|
|
* @property {number} unapprovedTypedMsgCount - The number of messages in unapprovedTypedMsgs.
|
2020-12-14 17:04:26 +01:00
|
|
|
* @property {number} pendingApprovalCount - The number of pending request in the approval controller.
|
2018-04-20 19:39:31 +02:00
|
|
|
* @property {string[]} keyringTypes - An array of unique keyring identifying strings, representing available strategies for creating accounts.
|
|
|
|
* @property {Keyring[]} keyrings - An array of keyring descriptions, summarizing the accounts that are available for use, and what keyrings they belong to.
|
|
|
|
* @property {string} selectedAddress - A lower case hex string of the currently selected address.
|
|
|
|
* @property {string} currentCurrency - A string identifying the user's preferred display currency, for use in showing conversion rates.
|
|
|
|
* @property {number} conversionRate - A number representing the current exchange rate from the user's preferred currency to Ether.
|
|
|
|
* @property {number} conversionDate - A unix epoch date (ms) for the time the current conversion rate was last retrieved.
|
|
|
|
* @property {boolean} forgottenPassword - Returns true if the user has initiated the password recovery screen, is recovering from seed phrase.
|
2018-04-19 20:23:15 +02:00
|
|
|
*/
|
|
|
|
|
2018-04-20 19:40:53 +02:00
|
|
|
/**
|
2018-04-19 20:23:15 +02:00
|
|
|
* @typedef VersionedData
|
|
|
|
* @property {MetaMaskState} data - The data emitted from MetaMask controller, or used to initialize it.
|
2022-01-07 16:57:33 +01:00
|
|
|
* @property {number} version - The latest migration version that has been run.
|
2018-04-19 20:23:15 +02:00
|
|
|
*/
|
|
|
|
|
2018-04-20 19:40:53 +02:00
|
|
|
/**
|
2018-04-19 20:23:15 +02:00
|
|
|
* Initializes the MetaMask controller, and sets up all platform configuration.
|
2022-01-07 16:57:33 +01:00
|
|
|
*
|
2020-11-10 18:30:41 +01:00
|
|
|
* @returns {Promise} Setup complete.
|
2018-04-19 20:23:15 +02:00
|
|
|
*/
|
2022-11-24 14:32:05 +01:00
|
|
|
async function initialize() {
|
|
|
|
try {
|
|
|
|
const initState = await loadStateFromPersistence();
|
|
|
|
const initLangCode = await getFirstPreferredLangCode();
|
2023-02-20 18:13:12 +01:00
|
|
|
|
2023-04-25 16:32:51 +02:00
|
|
|
///: BEGIN:ONLY_INCLUDE_IN(desktop)
|
2023-02-20 18:13:12 +01:00
|
|
|
await DesktopManager.init(platform.getVersion());
|
|
|
|
///: END:ONLY_INCLUDE_IN
|
|
|
|
|
2023-04-06 16:43:01 +02:00
|
|
|
let isFirstMetaMaskControllerSetup;
|
|
|
|
if (isManifestV3) {
|
|
|
|
const sessionData = await browser.storage.session.get([
|
|
|
|
'isFirstMetaMaskControllerSetup',
|
|
|
|
]);
|
|
|
|
|
|
|
|
isFirstMetaMaskControllerSetup =
|
|
|
|
sessionData?.isFirstMetaMaskControllerSetup === undefined;
|
|
|
|
await browser.storage.session.set({ isFirstMetaMaskControllerSetup });
|
|
|
|
}
|
|
|
|
|
|
|
|
setupController(
|
|
|
|
initState,
|
|
|
|
initLangCode,
|
|
|
|
{},
|
|
|
|
isFirstMetaMaskControllerSetup,
|
|
|
|
);
|
2022-11-24 14:32:05 +01:00
|
|
|
if (!isManifestV3) {
|
|
|
|
await loadPhishingWarningPage();
|
|
|
|
}
|
|
|
|
await sendReadyMessageToTabs();
|
|
|
|
log.info('MetaMask initialization complete.');
|
|
|
|
resolveInitialization();
|
|
|
|
} catch (error) {
|
|
|
|
rejectInitialization(error);
|
2022-10-04 17:14:46 +02:00
|
|
|
}
|
2017-05-12 22:09:23 +02:00
|
|
|
}
|
2017-01-12 04:04:19 +01:00
|
|
|
|
2022-05-06 00:28:48 +02:00
|
|
|
/**
|
|
|
|
* An error thrown if the phishing warning page takes too long to load.
|
|
|
|
*/
|
|
|
|
class PhishingWarningPageTimeoutError extends Error {
|
|
|
|
constructor() {
|
|
|
|
super('Timeout failed');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Load the phishing warning page temporarily to ensure the service
|
|
|
|
* worker has been registered, so that the warning page works offline.
|
|
|
|
*/
|
|
|
|
async function loadPhishingWarningPage() {
|
|
|
|
let iframe;
|
|
|
|
try {
|
|
|
|
const extensionStartupPhishingPageUrl = new URL(
|
2022-05-16 23:16:10 +02:00
|
|
|
process.env.PHISHING_WARNING_PAGE_URL,
|
2022-05-06 00:28:48 +02:00
|
|
|
);
|
|
|
|
// The `extensionStartup` hash signals to the phishing warning page that it should not bother
|
|
|
|
// setting up streams for user interaction. Otherwise this page load would cause a console
|
|
|
|
// error.
|
|
|
|
extensionStartupPhishingPageUrl.hash = '#extensionStartup';
|
|
|
|
|
|
|
|
iframe = window.document.createElement('iframe');
|
|
|
|
iframe.setAttribute('src', extensionStartupPhishingPageUrl.href);
|
|
|
|
iframe.setAttribute('sandbox', 'allow-scripts allow-same-origin');
|
|
|
|
|
|
|
|
// Create "deferred Promise" to allow passing resolve/reject to event handlers
|
|
|
|
let deferredResolve;
|
|
|
|
let deferredReject;
|
|
|
|
const loadComplete = new Promise((resolve, reject) => {
|
|
|
|
deferredResolve = resolve;
|
|
|
|
deferredReject = reject;
|
|
|
|
});
|
|
|
|
|
|
|
|
// The load event is emitted once loading has completed, even if the loading failed.
|
|
|
|
// If loading failed we can't do anything about it, so we don't need to check.
|
|
|
|
iframe.addEventListener('load', deferredResolve);
|
|
|
|
|
|
|
|
// This step initiates the page loading.
|
|
|
|
window.document.body.appendChild(iframe);
|
|
|
|
|
|
|
|
// This timeout ensures that this iframe gets cleaned up in a reasonable
|
|
|
|
// timeframe, and ensures that the "initialization complete" message
|
|
|
|
// doesn't get delayed too long.
|
|
|
|
setTimeout(
|
|
|
|
() => deferredReject(new PhishingWarningPageTimeoutError()),
|
|
|
|
PHISHING_WARNING_PAGE_TIMEOUT,
|
|
|
|
);
|
|
|
|
await loadComplete;
|
|
|
|
} catch (error) {
|
|
|
|
if (error instanceof PhishingWarningPageTimeoutError) {
|
|
|
|
console.warn(
|
|
|
|
'Phishing warning page timeout; page not guaraneteed to work offline.',
|
|
|
|
);
|
|
|
|
} else {
|
|
|
|
console.error('Failed to initialize phishing warning page', error);
|
|
|
|
}
|
|
|
|
} finally {
|
|
|
|
if (iframe) {
|
|
|
|
iframe.remove();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-01-12 07:47:56 +01:00
|
|
|
//
|
|
|
|
// State and Persistence
|
|
|
|
//
|
|
|
|
|
2018-04-20 19:40:53 +02:00
|
|
|
/**
|
2018-04-19 20:23:15 +02:00
|
|
|
* Loads any stored data, prioritizing the latest storage strategy.
|
|
|
|
* Migrates that data schema in case it was last loaded on an older version.
|
2022-01-07 16:57:33 +01:00
|
|
|
*
|
2020-11-10 18:30:41 +01:00
|
|
|
* @returns {Promise<MetaMaskState>} Last data emitted from previous instance of MetaMask.
|
2018-04-19 20:23:15 +02:00
|
|
|
*/
|
2023-02-14 17:06:19 +01:00
|
|
|
export async function loadStateFromPersistence() {
|
2017-01-12 10:17:05 +01:00
|
|
|
// migrations
|
2021-02-04 19:15:23 +01:00
|
|
|
const migrator = new Migrator({ migrations });
|
|
|
|
migrator.on('error', console.warn);
|
2018-01-03 06:53:11 +01:00
|
|
|
|
2018-03-07 23:42:59 +01:00
|
|
|
// read from disk
|
|
|
|
// first from preferred, async API:
|
2020-11-03 00:41:28 +01:00
|
|
|
versionedData =
|
2021-02-04 19:15:23 +01:00
|
|
|
(await localStore.get()) || migrator.generateInitialState(firstTimeState);
|
2018-03-07 23:42:59 +01:00
|
|
|
|
2018-04-06 21:05:24 +02:00
|
|
|
// check if somehow state is empty
|
|
|
|
// this should never happen but new error reporting suggests that it has
|
|
|
|
// for a small number of users
|
|
|
|
// https://github.com/metamask/metamask-extension/issues/3919
|
|
|
|
if (versionedData && !versionedData.data) {
|
2019-09-17 00:29:26 +02:00
|
|
|
// unable to recover, clear state
|
2021-02-04 19:15:23 +01:00
|
|
|
versionedData = migrator.generateInitialState(firstTimeState);
|
|
|
|
sentry.captureMessage('MetaMask - Empty vault found - unable to recover');
|
2018-04-06 21:05:24 +02:00
|
|
|
}
|
|
|
|
|
2018-04-05 22:15:08 +02:00
|
|
|
// report migration errors to sentry
|
|
|
|
migrator.on('error', (err) => {
|
|
|
|
// get vault structure without secrets
|
2021-02-04 19:15:23 +01:00
|
|
|
const vaultStructure = getObjStructure(versionedData);
|
2018-10-20 08:22:50 +02:00
|
|
|
sentry.captureException(err, {
|
2018-04-05 22:15:08 +02:00
|
|
|
// "extra" key is required by Sentry
|
|
|
|
extra: { vaultStructure },
|
2021-02-04 19:15:23 +01:00
|
|
|
});
|
|
|
|
});
|
2018-04-05 22:15:08 +02:00
|
|
|
|
2017-05-12 22:09:23 +02:00
|
|
|
// migrate data
|
2021-02-04 19:15:23 +01:00
|
|
|
versionedData = await migrator.migrateData(versionedData);
|
2018-03-08 23:10:28 +01:00
|
|
|
if (!versionedData) {
|
2021-02-04 19:15:23 +01:00
|
|
|
throw new Error('MetaMask - migrator returned undefined');
|
2018-03-08 23:10:28 +01:00
|
|
|
}
|
2022-10-11 00:10:44 +02:00
|
|
|
// this initializes the meta/version data as a class variable to be used for future writes
|
|
|
|
localStore.setMetadata(versionedData.meta);
|
2018-01-25 00:28:15 +01:00
|
|
|
|
2017-05-12 22:09:23 +02:00
|
|
|
// write to disk
|
2022-10-11 00:10:44 +02:00
|
|
|
localStore.set(versionedData.data);
|
2018-01-25 00:28:15 +01:00
|
|
|
|
2017-05-12 22:09:23 +02:00
|
|
|
// return just the data
|
2021-02-04 19:15:23 +01:00
|
|
|
return versionedData.data;
|
2017-01-12 07:47:56 +01:00
|
|
|
}
|
|
|
|
|
2023-05-03 17:39:56 +02:00
|
|
|
function generateConnectionId(remotePort, detectedProcessName) {
|
|
|
|
const { sender } = remotePort;
|
|
|
|
const id = sender?.tab ? sender.tab.id : sender?.id;
|
|
|
|
if (!id || !detectedProcessName) {
|
|
|
|
console.error(
|
|
|
|
'Must provide id and detectedProcessName to generate connection id.',
|
|
|
|
id,
|
|
|
|
detectedProcessName,
|
|
|
|
); // eslint-disable-line no-console
|
|
|
|
throw new Error(
|
|
|
|
'Must provide id and detectedProcessName to generate connection id.',
|
|
|
|
);
|
|
|
|
}
|
|
|
|
return `${id}-${detectedProcessName}`;
|
|
|
|
}
|
2018-04-20 19:40:53 +02:00
|
|
|
/**
|
2018-04-19 20:23:15 +02:00
|
|
|
* Initializes the MetaMask Controller with any initial state and default language.
|
|
|
|
* Configures platform-specific error reporting strategy.
|
|
|
|
* Streams emitted state updates to platform-specific storage strategy.
|
|
|
|
* Creates platform listeners for new Dapps/Contexts, and sets up their data connections to the controller.
|
|
|
|
*
|
2022-07-27 15:28:05 +02:00
|
|
|
* @param {object} initState - The initial state to start the controller with, matches the state that is emitted from the controller.
|
2020-01-13 19:36:36 +01:00
|
|
|
* @param {string} initLangCode - The region code for the language preferred by the current user.
|
2023-02-14 17:06:19 +01:00
|
|
|
* @param {object} overrides - object with callbacks that are allowed to override the setup controller logic (usefull for desktop app)
|
2023-04-06 16:43:01 +02:00
|
|
|
* @param isFirstMetaMaskControllerSetup
|
2018-04-19 20:23:15 +02:00
|
|
|
*/
|
2023-04-06 16:43:01 +02:00
|
|
|
export function setupController(
|
|
|
|
initState,
|
|
|
|
initLangCode,
|
|
|
|
overrides,
|
|
|
|
isFirstMetaMaskControllerSetup,
|
|
|
|
) {
|
2017-01-12 10:17:05 +01:00
|
|
|
//
|
|
|
|
// MetaMask Controller
|
|
|
|
//
|
2018-04-03 18:51:33 +02:00
|
|
|
|
2022-08-11 19:33:33 +02:00
|
|
|
controller = new MetamaskController({
|
2020-09-10 18:16:00 +02:00
|
|
|
infuraProjectId: process.env.INFURA_PROJECT_ID,
|
2017-01-12 10:17:05 +01:00
|
|
|
// User confirmation callbacks:
|
2020-11-16 17:32:53 +01:00
|
|
|
showUserConfirmation: triggerUi,
|
2017-01-12 10:17:05 +01:00
|
|
|
// initial state
|
|
|
|
initState,
|
2018-03-22 16:09:16 +01:00
|
|
|
// initial locale code
|
|
|
|
initLangCode,
|
2017-03-31 03:33:19 +02:00
|
|
|
// platform specific api
|
|
|
|
platform,
|
2022-01-05 18:09:19 +01:00
|
|
|
notificationManager,
|
2022-03-18 20:07:05 +01:00
|
|
|
browser,
|
Connect distinct accounts per site (#7004)
* add PermissionsController
remove provider approval controller
integrate rpc-cap
create PermissionsController
move provider approval functionality to permissions controller
add permissions approval ui, settings page
add permissions activity and history
move some functionality to metamask-inpage-provider
rename siteMetadata -> domainMetadata
add accountsChange notification to inpage provider
move functionality to inpage provider
update inpage provider
Remove 'Connections' settings page (#7369)
add hooks for exposing accounts in settings
rename unused messages in non-English locales
Add external extension id to metadata (#7396)
update inpage provider, rpc-cap
add eth_requestAccounts handling to background
prevent notifying connections if extension is locked
update inpage provider
Fix lint errors
add migration
review fixes
transaction controller review updates
removed unused messages
* Login Per Site UI (#7368)
* LoginPerSite original UI changes to keep
* First commit
* Get necessary connected tab info for redirect and icon display for permissioned sites
* Fix up designs and add missing features
* Some lint fixes
* More lint fixes
* Ensures the tx controller + tx-state-manager orders transactions in the order they are received
* Code cleanup for LoginPerSite-ui
* Update e2e tests to use new connection flow
* Fix display of connect screen and app header after login when connect request present
* Update metamask-responsive-ui.spec for new item in accounts dropdown
* Fix approve container by replacing approvedOrigins with domainMetaData
* Adds test/e2e/permissions.spec.js
* Correctly handle cancellation of a permissions request
* Redirect to home after disconnecting all sites / cancelling all permissions
* Fix display of site icons in menu
* Fix height of permissions page container
* Remove unused locale messages
* Set default values for openExternalTabs and tabIdOrigins in account-menu.container
* More code cleanup for LoginPerSite-ui
* Use extensions api to close tab in permissions-connect
* Remove unnecessary change in domIsReady() in contentscript
* Remove unnecessary private function markers and class methods (for background tab info) in metamask-controller.
* Adds getOriginOfCurrentTab selector
* Adds IconWithFallback component and substitutes for appropriate cases
* Add and utilize font mixins
* Remove unused method in disconnect-all.container.js
* Simplify buttonSizeLarge code in page-container-footer.component.js
* Add and utilize getAccountsWithLabels selector
* Remove console.log in ui/app/store/actions.js
* Change last connected time format to yyyy-M-d
* Fix css associated with IconWithFallback change
* Ensure tracked openNonMetamaskTabsIDs are correctly set to inactive on tab changes
* Code cleanup for LoginPerSite-ui
* Use reusable function for modifying openNonMetamaskTabsIDs in background.js
* Enables automatic switching to connected account when connected domain is open
* Prevent exploit of tabIdOriginMap in background.js
* Remove unneeded code from contentscript.js
* Simplify current tab origin and window opener logic using remotePort listener tabs.queryTabs
* Design and styling fixes for LoginPerSite-ui
* Fix permissionHistory and permission logging for eth_requestAccounts and eth_accounts
* Front end changes to support display of lastConnected time in connected and permissions screens
* Fix lint errors
* Refactor structure of permissionsHistory
* Fix default values and object modifications for domain and permissionsHistory related data
* Fix connecting to new accounts from modal
* Replace retweet.svg with connect-white.svg
* Fix signature-request.spec
* Update metamask-inpage-provider version
* Fix permissions e2e tests
* Remove unneeded delay from test/e2e/signature-request.spec.js
* Add delay before attempting to retrieve network id in dapp in ethereum-on=.spec
* Use requestAccountTabIds strategy for determining tab id that opened a given window
* Improve default values for permissions requests
* Add some message descriptions to app/_locales/en/messages.json
* Code clean up in permission controller
* Stopped deep cloning object in mapObjectValues
* Bump metamask-inpage-provider version
* Add missing description in app/_locales/en/messages.json
* Return promises from queryTabs and switchToTab of extension.js
* Remove unused getAllPermissions function
* Use default props in icon-with-fallback.component.js
* Stop passing to permissions controller
* Delete no longer used clear-approved-origins modal code
* Remove duplicate imports in ui/app/components/app/index.scss
* Use URL instead of regex in getOriginFromUrl()
* Add runtime error checking to platform, promise based extension.tab methods
* Support permission requests from external extensions
* Improve font size and colour of the domain origin on the permission confirmation screen
* Add support for toggling permissions
* Ensure getRenderablePermissionsDomains only returns domains with exposedAccount caveat permissions
* Remove unused code from LoginPerSite-ui branch
* Ensure modal closes on Enter press for new-account-modal.component.js
* Lint fix
* fixup! Login Per Site UI (#7368)
* Some code cleanup for LoginPerSite
* Adds UX for connecting to dapps via the connected sites screen (#7593)
* Adds UX for connecting to dapps via the connected sites screen
* Use openMetaMaskTabIds from background.js to determine if current active tab is MetaMask
* Delete unused permissions controller methods
* Fixes two small bugs in the LoginPerSite ui (#7595)
* Restore `providerRequest` message translations (#7600)
This message was removed, but it was replaced with a very similar
message called `likeToConnect`. The only difference is that the new
message has "MetaMask" in it. Preserving these messages without
"MetaMask" is probably better than deleting them, so these messages
have all been restored and renamed to `likeToConnect`.
* Login per site no sitemetadata fix (#7610)
* Support connected sites for which we have no site metadata.
* Change property containing subtitle info often populated by origin to a more accurate of purpose name
* Lint fix
* Improve disconnection modal messages (#7612)
* Improve disconnectAccountModalDescription and disconnectAllModalDescription messages
* Update disconnectAccountModalDescription app/_locales/en/messages.json
Co-Authored-By: Mark Stacey <markjstacey@gmail.com>
* Improve disconnectAccount modal message clarity
* Adds cancel button to the account selection screen of the permissions request flow (#7613)
* Fix eth_accounts permission language & selectability (#7614)
* fix eth_accounts language & selectability
* fix MetaMask capitalization in all messages
* Close sidebar when opening connected sites (#7611)
The 'Connected Sites' button in the accounts details now closes the
sidebar, if it is open. This was accomplished by pulling the click
handler for that button up to the wallet view component, where another
button already followed a similar pattern of closing the sidebar.
It seemed confusing to me that one handler was in the `AccountsDetails`
container component, and one was handed down from above, so I added
PropTypes to the container component.
I'm not sure that the WalletView component is the best place for this
logic, but I've put it there for now to be consistent with the add
token button.
* Reject permissions request upon tab close (#7618)
Permissions requests are now rejected when the page is closed. This
only applies to the full-screen view, as that is the view permission
requests should be handled in. The case where the user deals with the
request through a different view is handled in #7617
* Handle tab update failure (#7619)
`extension.tabs.update` can sometimes fail if the user interacts with
the tabs directly around the same time. The redirect flow has been
updated to ensure that the permissions tab is still closed in that
case. The user is on their own to find the dapp tab again in that case.
* Login per site tab popup fixes (#7617)
* Handle redirect in response to state update in permissions-connect
* Ensure origin is available to permissions-connect subcomponents during redirect
* Hide app bar whenever on redirect route
* Improvements to handling of redirects in permissions-connect
* Ensure permission request id change handling only happens when page is not null
* Lint fix
* Decouple confirm transaction screen from the selected address (#7622)
* Avoid race condtion that could prevent contextual account switching (#7623)
There was a race condition in the logic responsible for switching the
selected account based upon the active tab. It was asynchronously
querying the active tab, then assuming it had been retrieved later.
The active tab info itself was already in the redux store in another
spot, one that is guaranteed to be set before the UI renders. The
race condition was avoided by deleting the duplicate state, and using
the other active tab state.
* Only redirect back to dapp if current tab is active (#7621)
The "redirect back to dapp" behaviour can be disruptive when the
permissions connect tab is not active. The purpose of the redirect was
to maintain context between the dapp and the permissions request, but
if the user has already moved to another tab, that no longer applies.
* Fix JSX style lint errors
* Remove unused state
2019-12-03 18:35:56 +01:00
|
|
|
getRequestAccountTabIds: () => {
|
2021-02-04 19:15:23 +01:00
|
|
|
return requestAccountTabIds;
|
Connect distinct accounts per site (#7004)
* add PermissionsController
remove provider approval controller
integrate rpc-cap
create PermissionsController
move provider approval functionality to permissions controller
add permissions approval ui, settings page
add permissions activity and history
move some functionality to metamask-inpage-provider
rename siteMetadata -> domainMetadata
add accountsChange notification to inpage provider
move functionality to inpage provider
update inpage provider
Remove 'Connections' settings page (#7369)
add hooks for exposing accounts in settings
rename unused messages in non-English locales
Add external extension id to metadata (#7396)
update inpage provider, rpc-cap
add eth_requestAccounts handling to background
prevent notifying connections if extension is locked
update inpage provider
Fix lint errors
add migration
review fixes
transaction controller review updates
removed unused messages
* Login Per Site UI (#7368)
* LoginPerSite original UI changes to keep
* First commit
* Get necessary connected tab info for redirect and icon display for permissioned sites
* Fix up designs and add missing features
* Some lint fixes
* More lint fixes
* Ensures the tx controller + tx-state-manager orders transactions in the order they are received
* Code cleanup for LoginPerSite-ui
* Update e2e tests to use new connection flow
* Fix display of connect screen and app header after login when connect request present
* Update metamask-responsive-ui.spec for new item in accounts dropdown
* Fix approve container by replacing approvedOrigins with domainMetaData
* Adds test/e2e/permissions.spec.js
* Correctly handle cancellation of a permissions request
* Redirect to home after disconnecting all sites / cancelling all permissions
* Fix display of site icons in menu
* Fix height of permissions page container
* Remove unused locale messages
* Set default values for openExternalTabs and tabIdOrigins in account-menu.container
* More code cleanup for LoginPerSite-ui
* Use extensions api to close tab in permissions-connect
* Remove unnecessary change in domIsReady() in contentscript
* Remove unnecessary private function markers and class methods (for background tab info) in metamask-controller.
* Adds getOriginOfCurrentTab selector
* Adds IconWithFallback component and substitutes for appropriate cases
* Add and utilize font mixins
* Remove unused method in disconnect-all.container.js
* Simplify buttonSizeLarge code in page-container-footer.component.js
* Add and utilize getAccountsWithLabels selector
* Remove console.log in ui/app/store/actions.js
* Change last connected time format to yyyy-M-d
* Fix css associated with IconWithFallback change
* Ensure tracked openNonMetamaskTabsIDs are correctly set to inactive on tab changes
* Code cleanup for LoginPerSite-ui
* Use reusable function for modifying openNonMetamaskTabsIDs in background.js
* Enables automatic switching to connected account when connected domain is open
* Prevent exploit of tabIdOriginMap in background.js
* Remove unneeded code from contentscript.js
* Simplify current tab origin and window opener logic using remotePort listener tabs.queryTabs
* Design and styling fixes for LoginPerSite-ui
* Fix permissionHistory and permission logging for eth_requestAccounts and eth_accounts
* Front end changes to support display of lastConnected time in connected and permissions screens
* Fix lint errors
* Refactor structure of permissionsHistory
* Fix default values and object modifications for domain and permissionsHistory related data
* Fix connecting to new accounts from modal
* Replace retweet.svg with connect-white.svg
* Fix signature-request.spec
* Update metamask-inpage-provider version
* Fix permissions e2e tests
* Remove unneeded delay from test/e2e/signature-request.spec.js
* Add delay before attempting to retrieve network id in dapp in ethereum-on=.spec
* Use requestAccountTabIds strategy for determining tab id that opened a given window
* Improve default values for permissions requests
* Add some message descriptions to app/_locales/en/messages.json
* Code clean up in permission controller
* Stopped deep cloning object in mapObjectValues
* Bump metamask-inpage-provider version
* Add missing description in app/_locales/en/messages.json
* Return promises from queryTabs and switchToTab of extension.js
* Remove unused getAllPermissions function
* Use default props in icon-with-fallback.component.js
* Stop passing to permissions controller
* Delete no longer used clear-approved-origins modal code
* Remove duplicate imports in ui/app/components/app/index.scss
* Use URL instead of regex in getOriginFromUrl()
* Add runtime error checking to platform, promise based extension.tab methods
* Support permission requests from external extensions
* Improve font size and colour of the domain origin on the permission confirmation screen
* Add support for toggling permissions
* Ensure getRenderablePermissionsDomains only returns domains with exposedAccount caveat permissions
* Remove unused code from LoginPerSite-ui branch
* Ensure modal closes on Enter press for new-account-modal.component.js
* Lint fix
* fixup! Login Per Site UI (#7368)
* Some code cleanup for LoginPerSite
* Adds UX for connecting to dapps via the connected sites screen (#7593)
* Adds UX for connecting to dapps via the connected sites screen
* Use openMetaMaskTabIds from background.js to determine if current active tab is MetaMask
* Delete unused permissions controller methods
* Fixes two small bugs in the LoginPerSite ui (#7595)
* Restore `providerRequest` message translations (#7600)
This message was removed, but it was replaced with a very similar
message called `likeToConnect`. The only difference is that the new
message has "MetaMask" in it. Preserving these messages without
"MetaMask" is probably better than deleting them, so these messages
have all been restored and renamed to `likeToConnect`.
* Login per site no sitemetadata fix (#7610)
* Support connected sites for which we have no site metadata.
* Change property containing subtitle info often populated by origin to a more accurate of purpose name
* Lint fix
* Improve disconnection modal messages (#7612)
* Improve disconnectAccountModalDescription and disconnectAllModalDescription messages
* Update disconnectAccountModalDescription app/_locales/en/messages.json
Co-Authored-By: Mark Stacey <markjstacey@gmail.com>
* Improve disconnectAccount modal message clarity
* Adds cancel button to the account selection screen of the permissions request flow (#7613)
* Fix eth_accounts permission language & selectability (#7614)
* fix eth_accounts language & selectability
* fix MetaMask capitalization in all messages
* Close sidebar when opening connected sites (#7611)
The 'Connected Sites' button in the accounts details now closes the
sidebar, if it is open. This was accomplished by pulling the click
handler for that button up to the wallet view component, where another
button already followed a similar pattern of closing the sidebar.
It seemed confusing to me that one handler was in the `AccountsDetails`
container component, and one was handed down from above, so I added
PropTypes to the container component.
I'm not sure that the WalletView component is the best place for this
logic, but I've put it there for now to be consistent with the add
token button.
* Reject permissions request upon tab close (#7618)
Permissions requests are now rejected when the page is closed. This
only applies to the full-screen view, as that is the view permission
requests should be handled in. The case where the user deals with the
request through a different view is handled in #7617
* Handle tab update failure (#7619)
`extension.tabs.update` can sometimes fail if the user interacts with
the tabs directly around the same time. The redirect flow has been
updated to ensure that the permissions tab is still closed in that
case. The user is on their own to find the dapp tab again in that case.
* Login per site tab popup fixes (#7617)
* Handle redirect in response to state update in permissions-connect
* Ensure origin is available to permissions-connect subcomponents during redirect
* Hide app bar whenever on redirect route
* Improvements to handling of redirects in permissions-connect
* Ensure permission request id change handling only happens when page is not null
* Lint fix
* Decouple confirm transaction screen from the selected address (#7622)
* Avoid race condtion that could prevent contextual account switching (#7623)
There was a race condition in the logic responsible for switching the
selected account based upon the active tab. It was asynchronously
querying the active tab, then assuming it had been retrieved later.
The active tab info itself was already in the redux store in another
spot, one that is guaranteed to be set before the UI renders. The
race condition was avoided by deleting the duplicate state, and using
the other active tab state.
* Only redirect back to dapp if current tab is active (#7621)
The "redirect back to dapp" behaviour can be disruptive when the
permissions connect tab is not active. The purpose of the redirect was
to maintain context between the dapp and the permissions request, but
if the user has already moved to another tab, that no longer applies.
* Fix JSX style lint errors
* Remove unused state
2019-12-03 18:35:56 +01:00
|
|
|
},
|
|
|
|
getOpenMetamaskTabsIds: () => {
|
2021-02-04 19:15:23 +01:00
|
|
|
return openMetamaskTabsIDs;
|
Connect distinct accounts per site (#7004)
* add PermissionsController
remove provider approval controller
integrate rpc-cap
create PermissionsController
move provider approval functionality to permissions controller
add permissions approval ui, settings page
add permissions activity and history
move some functionality to metamask-inpage-provider
rename siteMetadata -> domainMetadata
add accountsChange notification to inpage provider
move functionality to inpage provider
update inpage provider
Remove 'Connections' settings page (#7369)
add hooks for exposing accounts in settings
rename unused messages in non-English locales
Add external extension id to metadata (#7396)
update inpage provider, rpc-cap
add eth_requestAccounts handling to background
prevent notifying connections if extension is locked
update inpage provider
Fix lint errors
add migration
review fixes
transaction controller review updates
removed unused messages
* Login Per Site UI (#7368)
* LoginPerSite original UI changes to keep
* First commit
* Get necessary connected tab info for redirect and icon display for permissioned sites
* Fix up designs and add missing features
* Some lint fixes
* More lint fixes
* Ensures the tx controller + tx-state-manager orders transactions in the order they are received
* Code cleanup for LoginPerSite-ui
* Update e2e tests to use new connection flow
* Fix display of connect screen and app header after login when connect request present
* Update metamask-responsive-ui.spec for new item in accounts dropdown
* Fix approve container by replacing approvedOrigins with domainMetaData
* Adds test/e2e/permissions.spec.js
* Correctly handle cancellation of a permissions request
* Redirect to home after disconnecting all sites / cancelling all permissions
* Fix display of site icons in menu
* Fix height of permissions page container
* Remove unused locale messages
* Set default values for openExternalTabs and tabIdOrigins in account-menu.container
* More code cleanup for LoginPerSite-ui
* Use extensions api to close tab in permissions-connect
* Remove unnecessary change in domIsReady() in contentscript
* Remove unnecessary private function markers and class methods (for background tab info) in metamask-controller.
* Adds getOriginOfCurrentTab selector
* Adds IconWithFallback component and substitutes for appropriate cases
* Add and utilize font mixins
* Remove unused method in disconnect-all.container.js
* Simplify buttonSizeLarge code in page-container-footer.component.js
* Add and utilize getAccountsWithLabels selector
* Remove console.log in ui/app/store/actions.js
* Change last connected time format to yyyy-M-d
* Fix css associated with IconWithFallback change
* Ensure tracked openNonMetamaskTabsIDs are correctly set to inactive on tab changes
* Code cleanup for LoginPerSite-ui
* Use reusable function for modifying openNonMetamaskTabsIDs in background.js
* Enables automatic switching to connected account when connected domain is open
* Prevent exploit of tabIdOriginMap in background.js
* Remove unneeded code from contentscript.js
* Simplify current tab origin and window opener logic using remotePort listener tabs.queryTabs
* Design and styling fixes for LoginPerSite-ui
* Fix permissionHistory and permission logging for eth_requestAccounts and eth_accounts
* Front end changes to support display of lastConnected time in connected and permissions screens
* Fix lint errors
* Refactor structure of permissionsHistory
* Fix default values and object modifications for domain and permissionsHistory related data
* Fix connecting to new accounts from modal
* Replace retweet.svg with connect-white.svg
* Fix signature-request.spec
* Update metamask-inpage-provider version
* Fix permissions e2e tests
* Remove unneeded delay from test/e2e/signature-request.spec.js
* Add delay before attempting to retrieve network id in dapp in ethereum-on=.spec
* Use requestAccountTabIds strategy for determining tab id that opened a given window
* Improve default values for permissions requests
* Add some message descriptions to app/_locales/en/messages.json
* Code clean up in permission controller
* Stopped deep cloning object in mapObjectValues
* Bump metamask-inpage-provider version
* Add missing description in app/_locales/en/messages.json
* Return promises from queryTabs and switchToTab of extension.js
* Remove unused getAllPermissions function
* Use default props in icon-with-fallback.component.js
* Stop passing to permissions controller
* Delete no longer used clear-approved-origins modal code
* Remove duplicate imports in ui/app/components/app/index.scss
* Use URL instead of regex in getOriginFromUrl()
* Add runtime error checking to platform, promise based extension.tab methods
* Support permission requests from external extensions
* Improve font size and colour of the domain origin on the permission confirmation screen
* Add support for toggling permissions
* Ensure getRenderablePermissionsDomains only returns domains with exposedAccount caveat permissions
* Remove unused code from LoginPerSite-ui branch
* Ensure modal closes on Enter press for new-account-modal.component.js
* Lint fix
* fixup! Login Per Site UI (#7368)
* Some code cleanup for LoginPerSite
* Adds UX for connecting to dapps via the connected sites screen (#7593)
* Adds UX for connecting to dapps via the connected sites screen
* Use openMetaMaskTabIds from background.js to determine if current active tab is MetaMask
* Delete unused permissions controller methods
* Fixes two small bugs in the LoginPerSite ui (#7595)
* Restore `providerRequest` message translations (#7600)
This message was removed, but it was replaced with a very similar
message called `likeToConnect`. The only difference is that the new
message has "MetaMask" in it. Preserving these messages without
"MetaMask" is probably better than deleting them, so these messages
have all been restored and renamed to `likeToConnect`.
* Login per site no sitemetadata fix (#7610)
* Support connected sites for which we have no site metadata.
* Change property containing subtitle info often populated by origin to a more accurate of purpose name
* Lint fix
* Improve disconnection modal messages (#7612)
* Improve disconnectAccountModalDescription and disconnectAllModalDescription messages
* Update disconnectAccountModalDescription app/_locales/en/messages.json
Co-Authored-By: Mark Stacey <markjstacey@gmail.com>
* Improve disconnectAccount modal message clarity
* Adds cancel button to the account selection screen of the permissions request flow (#7613)
* Fix eth_accounts permission language & selectability (#7614)
* fix eth_accounts language & selectability
* fix MetaMask capitalization in all messages
* Close sidebar when opening connected sites (#7611)
The 'Connected Sites' button in the accounts details now closes the
sidebar, if it is open. This was accomplished by pulling the click
handler for that button up to the wallet view component, where another
button already followed a similar pattern of closing the sidebar.
It seemed confusing to me that one handler was in the `AccountsDetails`
container component, and one was handed down from above, so I added
PropTypes to the container component.
I'm not sure that the WalletView component is the best place for this
logic, but I've put it there for now to be consistent with the add
token button.
* Reject permissions request upon tab close (#7618)
Permissions requests are now rejected when the page is closed. This
only applies to the full-screen view, as that is the view permission
requests should be handled in. The case where the user deals with the
request through a different view is handled in #7617
* Handle tab update failure (#7619)
`extension.tabs.update` can sometimes fail if the user interacts with
the tabs directly around the same time. The redirect flow has been
updated to ensure that the permissions tab is still closed in that
case. The user is on their own to find the dapp tab again in that case.
* Login per site tab popup fixes (#7617)
* Handle redirect in response to state update in permissions-connect
* Ensure origin is available to permissions-connect subcomponents during redirect
* Hide app bar whenever on redirect route
* Improvements to handling of redirects in permissions-connect
* Ensure permission request id change handling only happens when page is not null
* Lint fix
* Decouple confirm transaction screen from the selected address (#7622)
* Avoid race condtion that could prevent contextual account switching (#7623)
There was a race condition in the logic responsible for switching the
selected account based upon the active tab. It was asynchronously
querying the active tab, then assuming it had been retrieved later.
The active tab info itself was already in the redux store in another
spot, one that is guaranteed to be set before the UI renders. The
race condition was avoided by deleting the duplicate state, and using
the other active tab state.
* Only redirect back to dapp if current tab is active (#7621)
The "redirect back to dapp" behaviour can be disruptive when the
permissions connect tab is not active. The purpose of the redirect was
to maintain context between the dapp and the permissions request, but
if the user has already moved to another tab, that no longer applies.
* Fix JSX style lint errors
* Remove unused state
2019-12-03 18:35:56 +01:00
|
|
|
},
|
2022-10-11 00:10:44 +02:00
|
|
|
localStore,
|
2023-02-14 17:06:19 +01:00
|
|
|
overrides,
|
2023-04-06 16:43:01 +02:00
|
|
|
isFirstMetaMaskControllerSetup,
|
2021-02-04 19:15:23 +01:00
|
|
|
});
|
2017-01-12 07:47:56 +01:00
|
|
|
|
2019-12-12 20:28:07 +01:00
|
|
|
setupEnsIpfsResolver({
|
2023-02-22 18:43:37 +01:00
|
|
|
getCurrentChainId: () =>
|
2023-05-02 17:53:20 +02:00
|
|
|
controller.networkController.store.getState().providerConfig.chainId,
|
2020-11-03 00:41:28 +01:00
|
|
|
getIpfsGateway: controller.preferencesController.getIpfsGateway.bind(
|
|
|
|
controller.preferencesController,
|
|
|
|
),
|
2019-12-12 20:28:07 +01:00
|
|
|
provider: controller.provider,
|
2021-02-04 19:15:23 +01:00
|
|
|
});
|
2018-05-04 13:57:19 +02:00
|
|
|
|
2017-01-12 10:17:05 +01:00
|
|
|
// setup state persistence
|
2017-11-28 22:09:18 +01:00
|
|
|
pump(
|
2020-12-16 22:14:49 +01:00
|
|
|
storeAsStream(controller.store),
|
2018-03-08 23:10:28 +01:00
|
|
|
debounce(1000),
|
2023-02-14 17:06:19 +01:00
|
|
|
createStreamSink(async (state) => {
|
|
|
|
await localStore.set(state);
|
|
|
|
statePersistenceEvents.emit('state-persisted', state);
|
|
|
|
}),
|
2018-01-25 22:01:03 +01:00
|
|
|
(error) => {
|
2021-02-04 19:15:23 +01:00
|
|
|
log.error('MetaMask - Persistence pipeline failed', error);
|
2020-07-14 17:20:41 +02:00
|
|
|
},
|
2021-02-04 19:15:23 +01:00
|
|
|
);
|
2017-01-25 04:47:00 +01:00
|
|
|
|
2022-08-18 19:55:28 +02:00
|
|
|
setupSentryGetStateGlobal(controller);
|
2022-07-22 22:39:48 +02:00
|
|
|
|
2018-04-17 08:03:47 +02:00
|
|
|
const isClientOpenStatus = () => {
|
2020-11-03 00:41:28 +01:00
|
|
|
return (
|
|
|
|
popupIsOpen ||
|
|
|
|
Boolean(Object.keys(openMetamaskTabsIDs).length) ||
|
|
|
|
notificationIsOpen
|
2021-02-04 19:15:23 +01:00
|
|
|
);
|
|
|
|
};
|
2018-04-17 08:03:47 +02:00
|
|
|
|
2021-08-04 23:53:13 +02:00
|
|
|
const onCloseEnvironmentInstances = (isClientOpen, environmentType) => {
|
|
|
|
// if all instances of metamask are closed we call a method on the controller to stop gasFeeController polling
|
|
|
|
if (isClientOpen === false) {
|
|
|
|
controller.onClientClosed();
|
|
|
|
// otherwise we want to only remove the polling tokens for the environment type that has closed
|
|
|
|
} else {
|
|
|
|
// in the case of fullscreen environment a user might have multiple tabs open so we don't want to disconnect all of
|
|
|
|
// its corresponding polling tokens unless all tabs are closed.
|
|
|
|
if (
|
|
|
|
environmentType === ENVIRONMENT_TYPE_FULLSCREEN &&
|
|
|
|
Boolean(Object.keys(openMetamaskTabsIDs).length)
|
|
|
|
) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
controller.onEnvironmentTypeClosed(environmentType);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2018-04-20 19:40:53 +02:00
|
|
|
/**
|
2018-04-19 20:23:15 +02:00
|
|
|
* A runtime.Port object, as provided by the browser:
|
2022-01-07 16:57:33 +01:00
|
|
|
*
|
2018-05-18 20:52:28 +02:00
|
|
|
* @see https://developer.mozilla.org/en-US/Add-ons/WebExtensions/API/runtime/Port
|
2018-04-19 20:23:15 +02:00
|
|
|
* @typedef Port
|
|
|
|
* @type Object
|
|
|
|
*/
|
|
|
|
|
2018-04-20 19:40:53 +02:00
|
|
|
/**
|
2018-04-19 20:23:15 +02:00
|
|
|
* Connects a Port to the MetaMask controller via a multiplexed duplex stream.
|
|
|
|
* This method identifies trusted (MetaMask) interfaces, and connects them differently from untrusted (web pages).
|
2022-01-07 16:57:33 +01:00
|
|
|
*
|
2018-04-19 20:23:15 +02:00
|
|
|
* @param {Port} remotePort - The port provided by a new context.
|
|
|
|
*/
|
2022-11-24 14:32:05 +01:00
|
|
|
connectRemote = async (remotePort) => {
|
2023-04-25 16:32:51 +02:00
|
|
|
///: BEGIN:ONLY_INCLUDE_IN(desktop)
|
2023-02-20 18:13:12 +01:00
|
|
|
if (
|
|
|
|
DesktopManager.isDesktopEnabled() &&
|
|
|
|
OVERRIDE_ORIGIN.DESKTOP !== overrides?.getOrigin?.()
|
|
|
|
) {
|
|
|
|
DesktopManager.createStream(remotePort, CONNECTION_TYPE_INTERNAL).then(
|
|
|
|
() => {
|
|
|
|
// When in Desktop Mode the responsibility to send CONNECTION_READY is on the desktop app side
|
|
|
|
if (isManifestV3) {
|
|
|
|
// Message below if captured by UI code in app/scripts/ui.js which will trigger UI initialisation
|
|
|
|
// This ensures that UI is initialised only after background is ready
|
|
|
|
// It fixes the issue of blank screen coming when extension is loaded, the issue is very frequent in MV3
|
|
|
|
remotePort.postMessage({ name: 'CONNECTION_READY' });
|
|
|
|
}
|
|
|
|
},
|
|
|
|
);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
///: END:ONLY_INCLUDE_IN
|
|
|
|
|
2021-02-04 19:15:23 +01:00
|
|
|
const processName = remotePort.name;
|
2018-04-17 08:03:47 +02:00
|
|
|
|
2020-06-09 02:57:59 +02:00
|
|
|
if (metamaskBlockedPorts.includes(remotePort.name)) {
|
2021-02-04 19:15:23 +01:00
|
|
|
return;
|
2018-08-22 20:04:26 +02:00
|
|
|
}
|
|
|
|
|
2022-03-09 16:15:07 +01:00
|
|
|
let isMetaMaskInternalProcess = false;
|
|
|
|
const sourcePlatform = getPlatform();
|
2023-01-23 17:06:48 +01:00
|
|
|
const senderUrl = remotePort.sender?.url
|
|
|
|
? new URL(remotePort.sender.url)
|
|
|
|
: null;
|
2022-03-09 16:15:07 +01:00
|
|
|
|
|
|
|
if (sourcePlatform === PLATFORM_FIREFOX) {
|
|
|
|
isMetaMaskInternalProcess = metamaskInternalProcessHash[processName];
|
|
|
|
} else {
|
|
|
|
isMetaMaskInternalProcess =
|
2023-01-23 17:06:48 +01:00
|
|
|
senderUrl?.origin === `chrome-extension://${browser.runtime.id}`;
|
2022-03-09 16:15:07 +01:00
|
|
|
}
|
|
|
|
|
2017-01-12 10:17:05 +01:00
|
|
|
if (isMetaMaskInternalProcess) {
|
2023-02-14 17:06:19 +01:00
|
|
|
const portStream =
|
|
|
|
overrides?.getPortStream?.(remotePort) || new PortStream(remotePort);
|
2017-01-12 10:17:05 +01:00
|
|
|
// communication with popup
|
2021-02-04 19:15:23 +01:00
|
|
|
controller.isClientOpen = true;
|
|
|
|
controller.setupTrustedCommunication(portStream, remotePort.sender);
|
2022-08-16 17:21:42 +02:00
|
|
|
if (isManifestV3) {
|
2022-11-03 18:25:13 +01:00
|
|
|
// If we get a WORKER_KEEP_ALIVE message, we respond with an ACK
|
|
|
|
remotePort.onMessage.addListener((message) => {
|
|
|
|
if (message.name === WORKER_KEEP_ALIVE_MESSAGE) {
|
|
|
|
// To test un-comment this line and wait for 1 minute. An error should be shown on MetaMask UI.
|
|
|
|
remotePort.postMessage({ name: ACK_KEEP_ALIVE_MESSAGE });
|
2023-03-31 15:22:33 +02:00
|
|
|
|
|
|
|
controller.appStateController.setServiceWorkerLastActiveTime(
|
|
|
|
Date.now(),
|
|
|
|
);
|
2022-11-03 18:25:13 +01:00
|
|
|
}
|
|
|
|
});
|
2022-05-26 06:48:23 +02:00
|
|
|
}
|
|
|
|
|
2023-05-03 17:39:56 +02:00
|
|
|
const connectionId = generateConnectionId(remotePort, processName);
|
2018-04-17 08:03:47 +02:00
|
|
|
if (processName === ENVIRONMENT_TYPE_POPUP) {
|
2021-02-04 19:15:23 +01:00
|
|
|
popupIsOpen = true;
|
2017-01-27 05:52:46 +01:00
|
|
|
endOfStream(portStream, () => {
|
2023-05-03 17:39:56 +02:00
|
|
|
openMetamaskConnections.set(connectionId, 0);
|
2021-02-04 19:15:23 +01:00
|
|
|
popupIsOpen = false;
|
2021-08-04 23:53:13 +02:00
|
|
|
const isClientOpen = isClientOpenStatus();
|
|
|
|
controller.isClientOpen = isClientOpen;
|
|
|
|
onCloseEnvironmentInstances(isClientOpen, ENVIRONMENT_TYPE_POPUP);
|
2021-02-04 19:15:23 +01:00
|
|
|
});
|
2017-01-27 05:52:46 +01:00
|
|
|
}
|
2018-04-17 08:03:47 +02:00
|
|
|
|
|
|
|
if (processName === ENVIRONMENT_TYPE_NOTIFICATION) {
|
2021-02-04 19:15:23 +01:00
|
|
|
notificationIsOpen = true;
|
2018-03-08 05:09:40 +01:00
|
|
|
endOfStream(portStream, () => {
|
2023-05-03 17:39:56 +02:00
|
|
|
openMetamaskConnections.set(connectionId, 0);
|
2021-02-04 19:15:23 +01:00
|
|
|
notificationIsOpen = false;
|
2021-08-04 23:53:13 +02:00
|
|
|
const isClientOpen = isClientOpenStatus();
|
|
|
|
controller.isClientOpen = isClientOpen;
|
|
|
|
onCloseEnvironmentInstances(
|
|
|
|
isClientOpen,
|
|
|
|
ENVIRONMENT_TYPE_NOTIFICATION,
|
|
|
|
);
|
2021-02-04 19:15:23 +01:00
|
|
|
});
|
2018-04-17 08:03:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (processName === ENVIRONMENT_TYPE_FULLSCREEN) {
|
2021-02-04 19:15:23 +01:00
|
|
|
const tabId = remotePort.sender.tab.id;
|
|
|
|
openMetamaskTabsIDs[tabId] = true;
|
2018-04-17 08:03:47 +02:00
|
|
|
|
|
|
|
endOfStream(portStream, () => {
|
2023-05-03 17:39:56 +02:00
|
|
|
openMetamaskConnections.set(connectionId, 0);
|
2021-02-04 19:15:23 +01:00
|
|
|
delete openMetamaskTabsIDs[tabId];
|
2021-08-04 23:53:13 +02:00
|
|
|
const isClientOpen = isClientOpenStatus();
|
|
|
|
controller.isClientOpen = isClientOpen;
|
|
|
|
onCloseEnvironmentInstances(
|
|
|
|
isClientOpen,
|
|
|
|
ENVIRONMENT_TYPE_FULLSCREEN,
|
|
|
|
);
|
2021-02-04 19:15:23 +01:00
|
|
|
});
|
2018-03-08 05:09:40 +01:00
|
|
|
}
|
2022-05-06 00:28:48 +02:00
|
|
|
} else if (
|
|
|
|
senderUrl &&
|
|
|
|
senderUrl.origin === phishingPageUrl.origin &&
|
|
|
|
senderUrl.pathname === phishingPageUrl.pathname
|
|
|
|
) {
|
2023-02-14 17:06:19 +01:00
|
|
|
const portStream =
|
|
|
|
overrides?.getPortStream?.(remotePort) || new PortStream(remotePort);
|
2022-05-06 00:28:48 +02:00
|
|
|
controller.setupPhishingCommunication({
|
|
|
|
connectionStream: portStream,
|
|
|
|
});
|
2017-01-12 10:17:05 +01:00
|
|
|
} else {
|
Connect distinct accounts per site (#7004)
* add PermissionsController
remove provider approval controller
integrate rpc-cap
create PermissionsController
move provider approval functionality to permissions controller
add permissions approval ui, settings page
add permissions activity and history
move some functionality to metamask-inpage-provider
rename siteMetadata -> domainMetadata
add accountsChange notification to inpage provider
move functionality to inpage provider
update inpage provider
Remove 'Connections' settings page (#7369)
add hooks for exposing accounts in settings
rename unused messages in non-English locales
Add external extension id to metadata (#7396)
update inpage provider, rpc-cap
add eth_requestAccounts handling to background
prevent notifying connections if extension is locked
update inpage provider
Fix lint errors
add migration
review fixes
transaction controller review updates
removed unused messages
* Login Per Site UI (#7368)
* LoginPerSite original UI changes to keep
* First commit
* Get necessary connected tab info for redirect and icon display for permissioned sites
* Fix up designs and add missing features
* Some lint fixes
* More lint fixes
* Ensures the tx controller + tx-state-manager orders transactions in the order they are received
* Code cleanup for LoginPerSite-ui
* Update e2e tests to use new connection flow
* Fix display of connect screen and app header after login when connect request present
* Update metamask-responsive-ui.spec for new item in accounts dropdown
* Fix approve container by replacing approvedOrigins with domainMetaData
* Adds test/e2e/permissions.spec.js
* Correctly handle cancellation of a permissions request
* Redirect to home after disconnecting all sites / cancelling all permissions
* Fix display of site icons in menu
* Fix height of permissions page container
* Remove unused locale messages
* Set default values for openExternalTabs and tabIdOrigins in account-menu.container
* More code cleanup for LoginPerSite-ui
* Use extensions api to close tab in permissions-connect
* Remove unnecessary change in domIsReady() in contentscript
* Remove unnecessary private function markers and class methods (for background tab info) in metamask-controller.
* Adds getOriginOfCurrentTab selector
* Adds IconWithFallback component and substitutes for appropriate cases
* Add and utilize font mixins
* Remove unused method in disconnect-all.container.js
* Simplify buttonSizeLarge code in page-container-footer.component.js
* Add and utilize getAccountsWithLabels selector
* Remove console.log in ui/app/store/actions.js
* Change last connected time format to yyyy-M-d
* Fix css associated with IconWithFallback change
* Ensure tracked openNonMetamaskTabsIDs are correctly set to inactive on tab changes
* Code cleanup for LoginPerSite-ui
* Use reusable function for modifying openNonMetamaskTabsIDs in background.js
* Enables automatic switching to connected account when connected domain is open
* Prevent exploit of tabIdOriginMap in background.js
* Remove unneeded code from contentscript.js
* Simplify current tab origin and window opener logic using remotePort listener tabs.queryTabs
* Design and styling fixes for LoginPerSite-ui
* Fix permissionHistory and permission logging for eth_requestAccounts and eth_accounts
* Front end changes to support display of lastConnected time in connected and permissions screens
* Fix lint errors
* Refactor structure of permissionsHistory
* Fix default values and object modifications for domain and permissionsHistory related data
* Fix connecting to new accounts from modal
* Replace retweet.svg with connect-white.svg
* Fix signature-request.spec
* Update metamask-inpage-provider version
* Fix permissions e2e tests
* Remove unneeded delay from test/e2e/signature-request.spec.js
* Add delay before attempting to retrieve network id in dapp in ethereum-on=.spec
* Use requestAccountTabIds strategy for determining tab id that opened a given window
* Improve default values for permissions requests
* Add some message descriptions to app/_locales/en/messages.json
* Code clean up in permission controller
* Stopped deep cloning object in mapObjectValues
* Bump metamask-inpage-provider version
* Add missing description in app/_locales/en/messages.json
* Return promises from queryTabs and switchToTab of extension.js
* Remove unused getAllPermissions function
* Use default props in icon-with-fallback.component.js
* Stop passing to permissions controller
* Delete no longer used clear-approved-origins modal code
* Remove duplicate imports in ui/app/components/app/index.scss
* Use URL instead of regex in getOriginFromUrl()
* Add runtime error checking to platform, promise based extension.tab methods
* Support permission requests from external extensions
* Improve font size and colour of the domain origin on the permission confirmation screen
* Add support for toggling permissions
* Ensure getRenderablePermissionsDomains only returns domains with exposedAccount caveat permissions
* Remove unused code from LoginPerSite-ui branch
* Ensure modal closes on Enter press for new-account-modal.component.js
* Lint fix
* fixup! Login Per Site UI (#7368)
* Some code cleanup for LoginPerSite
* Adds UX for connecting to dapps via the connected sites screen (#7593)
* Adds UX for connecting to dapps via the connected sites screen
* Use openMetaMaskTabIds from background.js to determine if current active tab is MetaMask
* Delete unused permissions controller methods
* Fixes two small bugs in the LoginPerSite ui (#7595)
* Restore `providerRequest` message translations (#7600)
This message was removed, but it was replaced with a very similar
message called `likeToConnect`. The only difference is that the new
message has "MetaMask" in it. Preserving these messages without
"MetaMask" is probably better than deleting them, so these messages
have all been restored and renamed to `likeToConnect`.
* Login per site no sitemetadata fix (#7610)
* Support connected sites for which we have no site metadata.
* Change property containing subtitle info often populated by origin to a more accurate of purpose name
* Lint fix
* Improve disconnection modal messages (#7612)
* Improve disconnectAccountModalDescription and disconnectAllModalDescription messages
* Update disconnectAccountModalDescription app/_locales/en/messages.json
Co-Authored-By: Mark Stacey <markjstacey@gmail.com>
* Improve disconnectAccount modal message clarity
* Adds cancel button to the account selection screen of the permissions request flow (#7613)
* Fix eth_accounts permission language & selectability (#7614)
* fix eth_accounts language & selectability
* fix MetaMask capitalization in all messages
* Close sidebar when opening connected sites (#7611)
The 'Connected Sites' button in the accounts details now closes the
sidebar, if it is open. This was accomplished by pulling the click
handler for that button up to the wallet view component, where another
button already followed a similar pattern of closing the sidebar.
It seemed confusing to me that one handler was in the `AccountsDetails`
container component, and one was handed down from above, so I added
PropTypes to the container component.
I'm not sure that the WalletView component is the best place for this
logic, but I've put it there for now to be consistent with the add
token button.
* Reject permissions request upon tab close (#7618)
Permissions requests are now rejected when the page is closed. This
only applies to the full-screen view, as that is the view permission
requests should be handled in. The case where the user deals with the
request through a different view is handled in #7617
* Handle tab update failure (#7619)
`extension.tabs.update` can sometimes fail if the user interacts with
the tabs directly around the same time. The redirect flow has been
updated to ensure that the permissions tab is still closed in that
case. The user is on their own to find the dapp tab again in that case.
* Login per site tab popup fixes (#7617)
* Handle redirect in response to state update in permissions-connect
* Ensure origin is available to permissions-connect subcomponents during redirect
* Hide app bar whenever on redirect route
* Improvements to handling of redirects in permissions-connect
* Ensure permission request id change handling only happens when page is not null
* Lint fix
* Decouple confirm transaction screen from the selected address (#7622)
* Avoid race condtion that could prevent contextual account switching (#7623)
There was a race condition in the logic responsible for switching the
selected account based upon the active tab. It was asynchronously
querying the active tab, then assuming it had been retrieved later.
The active tab info itself was already in the redux store in another
spot, one that is guaranteed to be set before the UI renders. The
race condition was avoided by deleting the duplicate state, and using
the other active tab state.
* Only redirect back to dapp if current tab is active (#7621)
The "redirect back to dapp" behaviour can be disruptive when the
permissions connect tab is not active. The purpose of the redirect was
to maintain context between the dapp and the permissions request, but
if the user has already moved to another tab, that no longer applies.
* Fix JSX style lint errors
* Remove unused state
2019-12-03 18:35:56 +01:00
|
|
|
if (remotePort.sender && remotePort.sender.tab && remotePort.sender.url) {
|
2021-02-04 19:15:23 +01:00
|
|
|
const tabId = remotePort.sender.tab.id;
|
|
|
|
const url = new URL(remotePort.sender.url);
|
|
|
|
const { origin } = url;
|
Connect distinct accounts per site (#7004)
* add PermissionsController
remove provider approval controller
integrate rpc-cap
create PermissionsController
move provider approval functionality to permissions controller
add permissions approval ui, settings page
add permissions activity and history
move some functionality to metamask-inpage-provider
rename siteMetadata -> domainMetadata
add accountsChange notification to inpage provider
move functionality to inpage provider
update inpage provider
Remove 'Connections' settings page (#7369)
add hooks for exposing accounts in settings
rename unused messages in non-English locales
Add external extension id to metadata (#7396)
update inpage provider, rpc-cap
add eth_requestAccounts handling to background
prevent notifying connections if extension is locked
update inpage provider
Fix lint errors
add migration
review fixes
transaction controller review updates
removed unused messages
* Login Per Site UI (#7368)
* LoginPerSite original UI changes to keep
* First commit
* Get necessary connected tab info for redirect and icon display for permissioned sites
* Fix up designs and add missing features
* Some lint fixes
* More lint fixes
* Ensures the tx controller + tx-state-manager orders transactions in the order they are received
* Code cleanup for LoginPerSite-ui
* Update e2e tests to use new connection flow
* Fix display of connect screen and app header after login when connect request present
* Update metamask-responsive-ui.spec for new item in accounts dropdown
* Fix approve container by replacing approvedOrigins with domainMetaData
* Adds test/e2e/permissions.spec.js
* Correctly handle cancellation of a permissions request
* Redirect to home after disconnecting all sites / cancelling all permissions
* Fix display of site icons in menu
* Fix height of permissions page container
* Remove unused locale messages
* Set default values for openExternalTabs and tabIdOrigins in account-menu.container
* More code cleanup for LoginPerSite-ui
* Use extensions api to close tab in permissions-connect
* Remove unnecessary change in domIsReady() in contentscript
* Remove unnecessary private function markers and class methods (for background tab info) in metamask-controller.
* Adds getOriginOfCurrentTab selector
* Adds IconWithFallback component and substitutes for appropriate cases
* Add and utilize font mixins
* Remove unused method in disconnect-all.container.js
* Simplify buttonSizeLarge code in page-container-footer.component.js
* Add and utilize getAccountsWithLabels selector
* Remove console.log in ui/app/store/actions.js
* Change last connected time format to yyyy-M-d
* Fix css associated with IconWithFallback change
* Ensure tracked openNonMetamaskTabsIDs are correctly set to inactive on tab changes
* Code cleanup for LoginPerSite-ui
* Use reusable function for modifying openNonMetamaskTabsIDs in background.js
* Enables automatic switching to connected account when connected domain is open
* Prevent exploit of tabIdOriginMap in background.js
* Remove unneeded code from contentscript.js
* Simplify current tab origin and window opener logic using remotePort listener tabs.queryTabs
* Design and styling fixes for LoginPerSite-ui
* Fix permissionHistory and permission logging for eth_requestAccounts and eth_accounts
* Front end changes to support display of lastConnected time in connected and permissions screens
* Fix lint errors
* Refactor structure of permissionsHistory
* Fix default values and object modifications for domain and permissionsHistory related data
* Fix connecting to new accounts from modal
* Replace retweet.svg with connect-white.svg
* Fix signature-request.spec
* Update metamask-inpage-provider version
* Fix permissions e2e tests
* Remove unneeded delay from test/e2e/signature-request.spec.js
* Add delay before attempting to retrieve network id in dapp in ethereum-on=.spec
* Use requestAccountTabIds strategy for determining tab id that opened a given window
* Improve default values for permissions requests
* Add some message descriptions to app/_locales/en/messages.json
* Code clean up in permission controller
* Stopped deep cloning object in mapObjectValues
* Bump metamask-inpage-provider version
* Add missing description in app/_locales/en/messages.json
* Return promises from queryTabs and switchToTab of extension.js
* Remove unused getAllPermissions function
* Use default props in icon-with-fallback.component.js
* Stop passing to permissions controller
* Delete no longer used clear-approved-origins modal code
* Remove duplicate imports in ui/app/components/app/index.scss
* Use URL instead of regex in getOriginFromUrl()
* Add runtime error checking to platform, promise based extension.tab methods
* Support permission requests from external extensions
* Improve font size and colour of the domain origin on the permission confirmation screen
* Add support for toggling permissions
* Ensure getRenderablePermissionsDomains only returns domains with exposedAccount caveat permissions
* Remove unused code from LoginPerSite-ui branch
* Ensure modal closes on Enter press for new-account-modal.component.js
* Lint fix
* fixup! Login Per Site UI (#7368)
* Some code cleanup for LoginPerSite
* Adds UX for connecting to dapps via the connected sites screen (#7593)
* Adds UX for connecting to dapps via the connected sites screen
* Use openMetaMaskTabIds from background.js to determine if current active tab is MetaMask
* Delete unused permissions controller methods
* Fixes two small bugs in the LoginPerSite ui (#7595)
* Restore `providerRequest` message translations (#7600)
This message was removed, but it was replaced with a very similar
message called `likeToConnect`. The only difference is that the new
message has "MetaMask" in it. Preserving these messages without
"MetaMask" is probably better than deleting them, so these messages
have all been restored and renamed to `likeToConnect`.
* Login per site no sitemetadata fix (#7610)
* Support connected sites for which we have no site metadata.
* Change property containing subtitle info often populated by origin to a more accurate of purpose name
* Lint fix
* Improve disconnection modal messages (#7612)
* Improve disconnectAccountModalDescription and disconnectAllModalDescription messages
* Update disconnectAccountModalDescription app/_locales/en/messages.json
Co-Authored-By: Mark Stacey <markjstacey@gmail.com>
* Improve disconnectAccount modal message clarity
* Adds cancel button to the account selection screen of the permissions request flow (#7613)
* Fix eth_accounts permission language & selectability (#7614)
* fix eth_accounts language & selectability
* fix MetaMask capitalization in all messages
* Close sidebar when opening connected sites (#7611)
The 'Connected Sites' button in the accounts details now closes the
sidebar, if it is open. This was accomplished by pulling the click
handler for that button up to the wallet view component, where another
button already followed a similar pattern of closing the sidebar.
It seemed confusing to me that one handler was in the `AccountsDetails`
container component, and one was handed down from above, so I added
PropTypes to the container component.
I'm not sure that the WalletView component is the best place for this
logic, but I've put it there for now to be consistent with the add
token button.
* Reject permissions request upon tab close (#7618)
Permissions requests are now rejected when the page is closed. This
only applies to the full-screen view, as that is the view permission
requests should be handled in. The case where the user deals with the
request through a different view is handled in #7617
* Handle tab update failure (#7619)
`extension.tabs.update` can sometimes fail if the user interacts with
the tabs directly around the same time. The redirect flow has been
updated to ensure that the permissions tab is still closed in that
case. The user is on their own to find the dapp tab again in that case.
* Login per site tab popup fixes (#7617)
* Handle redirect in response to state update in permissions-connect
* Ensure origin is available to permissions-connect subcomponents during redirect
* Hide app bar whenever on redirect route
* Improvements to handling of redirects in permissions-connect
* Ensure permission request id change handling only happens when page is not null
* Lint fix
* Decouple confirm transaction screen from the selected address (#7622)
* Avoid race condtion that could prevent contextual account switching (#7623)
There was a race condition in the logic responsible for switching the
selected account based upon the active tab. It was asynchronously
querying the active tab, then assuming it had been retrieved later.
The active tab info itself was already in the redux store in another
spot, one that is guaranteed to be set before the UI renders. The
race condition was avoided by deleting the duplicate state, and using
the other active tab state.
* Only redirect back to dapp if current tab is active (#7621)
The "redirect back to dapp" behaviour can be disruptive when the
permissions connect tab is not active. The purpose of the redirect was
to maintain context between the dapp and the permissions request, but
if the user has already moved to another tab, that no longer applies.
* Fix JSX style lint errors
* Remove unused state
2019-12-03 18:35:56 +01:00
|
|
|
|
2020-02-15 21:34:12 +01:00
|
|
|
remotePort.onMessage.addListener((msg) => {
|
Connect distinct accounts per site (#7004)
* add PermissionsController
remove provider approval controller
integrate rpc-cap
create PermissionsController
move provider approval functionality to permissions controller
add permissions approval ui, settings page
add permissions activity and history
move some functionality to metamask-inpage-provider
rename siteMetadata -> domainMetadata
add accountsChange notification to inpage provider
move functionality to inpage provider
update inpage provider
Remove 'Connections' settings page (#7369)
add hooks for exposing accounts in settings
rename unused messages in non-English locales
Add external extension id to metadata (#7396)
update inpage provider, rpc-cap
add eth_requestAccounts handling to background
prevent notifying connections if extension is locked
update inpage provider
Fix lint errors
add migration
review fixes
transaction controller review updates
removed unused messages
* Login Per Site UI (#7368)
* LoginPerSite original UI changes to keep
* First commit
* Get necessary connected tab info for redirect and icon display for permissioned sites
* Fix up designs and add missing features
* Some lint fixes
* More lint fixes
* Ensures the tx controller + tx-state-manager orders transactions in the order they are received
* Code cleanup for LoginPerSite-ui
* Update e2e tests to use new connection flow
* Fix display of connect screen and app header after login when connect request present
* Update metamask-responsive-ui.spec for new item in accounts dropdown
* Fix approve container by replacing approvedOrigins with domainMetaData
* Adds test/e2e/permissions.spec.js
* Correctly handle cancellation of a permissions request
* Redirect to home after disconnecting all sites / cancelling all permissions
* Fix display of site icons in menu
* Fix height of permissions page container
* Remove unused locale messages
* Set default values for openExternalTabs and tabIdOrigins in account-menu.container
* More code cleanup for LoginPerSite-ui
* Use extensions api to close tab in permissions-connect
* Remove unnecessary change in domIsReady() in contentscript
* Remove unnecessary private function markers and class methods (for background tab info) in metamask-controller.
* Adds getOriginOfCurrentTab selector
* Adds IconWithFallback component and substitutes for appropriate cases
* Add and utilize font mixins
* Remove unused method in disconnect-all.container.js
* Simplify buttonSizeLarge code in page-container-footer.component.js
* Add and utilize getAccountsWithLabels selector
* Remove console.log in ui/app/store/actions.js
* Change last connected time format to yyyy-M-d
* Fix css associated with IconWithFallback change
* Ensure tracked openNonMetamaskTabsIDs are correctly set to inactive on tab changes
* Code cleanup for LoginPerSite-ui
* Use reusable function for modifying openNonMetamaskTabsIDs in background.js
* Enables automatic switching to connected account when connected domain is open
* Prevent exploit of tabIdOriginMap in background.js
* Remove unneeded code from contentscript.js
* Simplify current tab origin and window opener logic using remotePort listener tabs.queryTabs
* Design and styling fixes for LoginPerSite-ui
* Fix permissionHistory and permission logging for eth_requestAccounts and eth_accounts
* Front end changes to support display of lastConnected time in connected and permissions screens
* Fix lint errors
* Refactor structure of permissionsHistory
* Fix default values and object modifications for domain and permissionsHistory related data
* Fix connecting to new accounts from modal
* Replace retweet.svg with connect-white.svg
* Fix signature-request.spec
* Update metamask-inpage-provider version
* Fix permissions e2e tests
* Remove unneeded delay from test/e2e/signature-request.spec.js
* Add delay before attempting to retrieve network id in dapp in ethereum-on=.spec
* Use requestAccountTabIds strategy for determining tab id that opened a given window
* Improve default values for permissions requests
* Add some message descriptions to app/_locales/en/messages.json
* Code clean up in permission controller
* Stopped deep cloning object in mapObjectValues
* Bump metamask-inpage-provider version
* Add missing description in app/_locales/en/messages.json
* Return promises from queryTabs and switchToTab of extension.js
* Remove unused getAllPermissions function
* Use default props in icon-with-fallback.component.js
* Stop passing to permissions controller
* Delete no longer used clear-approved-origins modal code
* Remove duplicate imports in ui/app/components/app/index.scss
* Use URL instead of regex in getOriginFromUrl()
* Add runtime error checking to platform, promise based extension.tab methods
* Support permission requests from external extensions
* Improve font size and colour of the domain origin on the permission confirmation screen
* Add support for toggling permissions
* Ensure getRenderablePermissionsDomains only returns domains with exposedAccount caveat permissions
* Remove unused code from LoginPerSite-ui branch
* Ensure modal closes on Enter press for new-account-modal.component.js
* Lint fix
* fixup! Login Per Site UI (#7368)
* Some code cleanup for LoginPerSite
* Adds UX for connecting to dapps via the connected sites screen (#7593)
* Adds UX for connecting to dapps via the connected sites screen
* Use openMetaMaskTabIds from background.js to determine if current active tab is MetaMask
* Delete unused permissions controller methods
* Fixes two small bugs in the LoginPerSite ui (#7595)
* Restore `providerRequest` message translations (#7600)
This message was removed, but it was replaced with a very similar
message called `likeToConnect`. The only difference is that the new
message has "MetaMask" in it. Preserving these messages without
"MetaMask" is probably better than deleting them, so these messages
have all been restored and renamed to `likeToConnect`.
* Login per site no sitemetadata fix (#7610)
* Support connected sites for which we have no site metadata.
* Change property containing subtitle info often populated by origin to a more accurate of purpose name
* Lint fix
* Improve disconnection modal messages (#7612)
* Improve disconnectAccountModalDescription and disconnectAllModalDescription messages
* Update disconnectAccountModalDescription app/_locales/en/messages.json
Co-Authored-By: Mark Stacey <markjstacey@gmail.com>
* Improve disconnectAccount modal message clarity
* Adds cancel button to the account selection screen of the permissions request flow (#7613)
* Fix eth_accounts permission language & selectability (#7614)
* fix eth_accounts language & selectability
* fix MetaMask capitalization in all messages
* Close sidebar when opening connected sites (#7611)
The 'Connected Sites' button in the accounts details now closes the
sidebar, if it is open. This was accomplished by pulling the click
handler for that button up to the wallet view component, where another
button already followed a similar pattern of closing the sidebar.
It seemed confusing to me that one handler was in the `AccountsDetails`
container component, and one was handed down from above, so I added
PropTypes to the container component.
I'm not sure that the WalletView component is the best place for this
logic, but I've put it there for now to be consistent with the add
token button.
* Reject permissions request upon tab close (#7618)
Permissions requests are now rejected when the page is closed. This
only applies to the full-screen view, as that is the view permission
requests should be handled in. The case where the user deals with the
request through a different view is handled in #7617
* Handle tab update failure (#7619)
`extension.tabs.update` can sometimes fail if the user interacts with
the tabs directly around the same time. The redirect flow has been
updated to ensure that the permissions tab is still closed in that
case. The user is on their own to find the dapp tab again in that case.
* Login per site tab popup fixes (#7617)
* Handle redirect in response to state update in permissions-connect
* Ensure origin is available to permissions-connect subcomponents during redirect
* Hide app bar whenever on redirect route
* Improvements to handling of redirects in permissions-connect
* Ensure permission request id change handling only happens when page is not null
* Lint fix
* Decouple confirm transaction screen from the selected address (#7622)
* Avoid race condtion that could prevent contextual account switching (#7623)
There was a race condition in the logic responsible for switching the
selected account based upon the active tab. It was asynchronously
querying the active tab, then assuming it had been retrieved later.
The active tab info itself was already in the redux store in another
spot, one that is guaranteed to be set before the UI renders. The
race condition was avoided by deleting the duplicate state, and using
the other active tab state.
* Only redirect back to dapp if current tab is active (#7621)
The "redirect back to dapp" behaviour can be disruptive when the
permissions connect tab is not active. The purpose of the redirect was
to maintain context between the dapp and the permissions request, but
if the user has already moved to another tab, that no longer applies.
* Fix JSX style lint errors
* Remove unused state
2019-12-03 18:35:56 +01:00
|
|
|
if (msg.data && msg.data.method === 'eth_requestAccounts') {
|
2021-02-04 19:15:23 +01:00
|
|
|
requestAccountTabIds[origin] = tabId;
|
Connect distinct accounts per site (#7004)
* add PermissionsController
remove provider approval controller
integrate rpc-cap
create PermissionsController
move provider approval functionality to permissions controller
add permissions approval ui, settings page
add permissions activity and history
move some functionality to metamask-inpage-provider
rename siteMetadata -> domainMetadata
add accountsChange notification to inpage provider
move functionality to inpage provider
update inpage provider
Remove 'Connections' settings page (#7369)
add hooks for exposing accounts in settings
rename unused messages in non-English locales
Add external extension id to metadata (#7396)
update inpage provider, rpc-cap
add eth_requestAccounts handling to background
prevent notifying connections if extension is locked
update inpage provider
Fix lint errors
add migration
review fixes
transaction controller review updates
removed unused messages
* Login Per Site UI (#7368)
* LoginPerSite original UI changes to keep
* First commit
* Get necessary connected tab info for redirect and icon display for permissioned sites
* Fix up designs and add missing features
* Some lint fixes
* More lint fixes
* Ensures the tx controller + tx-state-manager orders transactions in the order they are received
* Code cleanup for LoginPerSite-ui
* Update e2e tests to use new connection flow
* Fix display of connect screen and app header after login when connect request present
* Update metamask-responsive-ui.spec for new item in accounts dropdown
* Fix approve container by replacing approvedOrigins with domainMetaData
* Adds test/e2e/permissions.spec.js
* Correctly handle cancellation of a permissions request
* Redirect to home after disconnecting all sites / cancelling all permissions
* Fix display of site icons in menu
* Fix height of permissions page container
* Remove unused locale messages
* Set default values for openExternalTabs and tabIdOrigins in account-menu.container
* More code cleanup for LoginPerSite-ui
* Use extensions api to close tab in permissions-connect
* Remove unnecessary change in domIsReady() in contentscript
* Remove unnecessary private function markers and class methods (for background tab info) in metamask-controller.
* Adds getOriginOfCurrentTab selector
* Adds IconWithFallback component and substitutes for appropriate cases
* Add and utilize font mixins
* Remove unused method in disconnect-all.container.js
* Simplify buttonSizeLarge code in page-container-footer.component.js
* Add and utilize getAccountsWithLabels selector
* Remove console.log in ui/app/store/actions.js
* Change last connected time format to yyyy-M-d
* Fix css associated with IconWithFallback change
* Ensure tracked openNonMetamaskTabsIDs are correctly set to inactive on tab changes
* Code cleanup for LoginPerSite-ui
* Use reusable function for modifying openNonMetamaskTabsIDs in background.js
* Enables automatic switching to connected account when connected domain is open
* Prevent exploit of tabIdOriginMap in background.js
* Remove unneeded code from contentscript.js
* Simplify current tab origin and window opener logic using remotePort listener tabs.queryTabs
* Design and styling fixes for LoginPerSite-ui
* Fix permissionHistory and permission logging for eth_requestAccounts and eth_accounts
* Front end changes to support display of lastConnected time in connected and permissions screens
* Fix lint errors
* Refactor structure of permissionsHistory
* Fix default values and object modifications for domain and permissionsHistory related data
* Fix connecting to new accounts from modal
* Replace retweet.svg with connect-white.svg
* Fix signature-request.spec
* Update metamask-inpage-provider version
* Fix permissions e2e tests
* Remove unneeded delay from test/e2e/signature-request.spec.js
* Add delay before attempting to retrieve network id in dapp in ethereum-on=.spec
* Use requestAccountTabIds strategy for determining tab id that opened a given window
* Improve default values for permissions requests
* Add some message descriptions to app/_locales/en/messages.json
* Code clean up in permission controller
* Stopped deep cloning object in mapObjectValues
* Bump metamask-inpage-provider version
* Add missing description in app/_locales/en/messages.json
* Return promises from queryTabs and switchToTab of extension.js
* Remove unused getAllPermissions function
* Use default props in icon-with-fallback.component.js
* Stop passing to permissions controller
* Delete no longer used clear-approved-origins modal code
* Remove duplicate imports in ui/app/components/app/index.scss
* Use URL instead of regex in getOriginFromUrl()
* Add runtime error checking to platform, promise based extension.tab methods
* Support permission requests from external extensions
* Improve font size and colour of the domain origin on the permission confirmation screen
* Add support for toggling permissions
* Ensure getRenderablePermissionsDomains only returns domains with exposedAccount caveat permissions
* Remove unused code from LoginPerSite-ui branch
* Ensure modal closes on Enter press for new-account-modal.component.js
* Lint fix
* fixup! Login Per Site UI (#7368)
* Some code cleanup for LoginPerSite
* Adds UX for connecting to dapps via the connected sites screen (#7593)
* Adds UX for connecting to dapps via the connected sites screen
* Use openMetaMaskTabIds from background.js to determine if current active tab is MetaMask
* Delete unused permissions controller methods
* Fixes two small bugs in the LoginPerSite ui (#7595)
* Restore `providerRequest` message translations (#7600)
This message was removed, but it was replaced with a very similar
message called `likeToConnect`. The only difference is that the new
message has "MetaMask" in it. Preserving these messages without
"MetaMask" is probably better than deleting them, so these messages
have all been restored and renamed to `likeToConnect`.
* Login per site no sitemetadata fix (#7610)
* Support connected sites for which we have no site metadata.
* Change property containing subtitle info often populated by origin to a more accurate of purpose name
* Lint fix
* Improve disconnection modal messages (#7612)
* Improve disconnectAccountModalDescription and disconnectAllModalDescription messages
* Update disconnectAccountModalDescription app/_locales/en/messages.json
Co-Authored-By: Mark Stacey <markjstacey@gmail.com>
* Improve disconnectAccount modal message clarity
* Adds cancel button to the account selection screen of the permissions request flow (#7613)
* Fix eth_accounts permission language & selectability (#7614)
* fix eth_accounts language & selectability
* fix MetaMask capitalization in all messages
* Close sidebar when opening connected sites (#7611)
The 'Connected Sites' button in the accounts details now closes the
sidebar, if it is open. This was accomplished by pulling the click
handler for that button up to the wallet view component, where another
button already followed a similar pattern of closing the sidebar.
It seemed confusing to me that one handler was in the `AccountsDetails`
container component, and one was handed down from above, so I added
PropTypes to the container component.
I'm not sure that the WalletView component is the best place for this
logic, but I've put it there for now to be consistent with the add
token button.
* Reject permissions request upon tab close (#7618)
Permissions requests are now rejected when the page is closed. This
only applies to the full-screen view, as that is the view permission
requests should be handled in. The case where the user deals with the
request through a different view is handled in #7617
* Handle tab update failure (#7619)
`extension.tabs.update` can sometimes fail if the user interacts with
the tabs directly around the same time. The redirect flow has been
updated to ensure that the permissions tab is still closed in that
case. The user is on their own to find the dapp tab again in that case.
* Login per site tab popup fixes (#7617)
* Handle redirect in response to state update in permissions-connect
* Ensure origin is available to permissions-connect subcomponents during redirect
* Hide app bar whenever on redirect route
* Improvements to handling of redirects in permissions-connect
* Ensure permission request id change handling only happens when page is not null
* Lint fix
* Decouple confirm transaction screen from the selected address (#7622)
* Avoid race condtion that could prevent contextual account switching (#7623)
There was a race condition in the logic responsible for switching the
selected account based upon the active tab. It was asynchronously
querying the active tab, then assuming it had been retrieved later.
The active tab info itself was already in the redux store in another
spot, one that is guaranteed to be set before the UI renders. The
race condition was avoided by deleting the duplicate state, and using
the other active tab state.
* Only redirect back to dapp if current tab is active (#7621)
The "redirect back to dapp" behaviour can be disruptive when the
permissions connect tab is not active. The purpose of the redirect was
to maintain context between the dapp and the permissions request, but
if the user has already moved to another tab, that no longer applies.
* Fix JSX style lint errors
* Remove unused state
2019-12-03 18:35:56 +01:00
|
|
|
}
|
2021-02-04 19:15:23 +01:00
|
|
|
});
|
Connect distinct accounts per site (#7004)
* add PermissionsController
remove provider approval controller
integrate rpc-cap
create PermissionsController
move provider approval functionality to permissions controller
add permissions approval ui, settings page
add permissions activity and history
move some functionality to metamask-inpage-provider
rename siteMetadata -> domainMetadata
add accountsChange notification to inpage provider
move functionality to inpage provider
update inpage provider
Remove 'Connections' settings page (#7369)
add hooks for exposing accounts in settings
rename unused messages in non-English locales
Add external extension id to metadata (#7396)
update inpage provider, rpc-cap
add eth_requestAccounts handling to background
prevent notifying connections if extension is locked
update inpage provider
Fix lint errors
add migration
review fixes
transaction controller review updates
removed unused messages
* Login Per Site UI (#7368)
* LoginPerSite original UI changes to keep
* First commit
* Get necessary connected tab info for redirect and icon display for permissioned sites
* Fix up designs and add missing features
* Some lint fixes
* More lint fixes
* Ensures the tx controller + tx-state-manager orders transactions in the order they are received
* Code cleanup for LoginPerSite-ui
* Update e2e tests to use new connection flow
* Fix display of connect screen and app header after login when connect request present
* Update metamask-responsive-ui.spec for new item in accounts dropdown
* Fix approve container by replacing approvedOrigins with domainMetaData
* Adds test/e2e/permissions.spec.js
* Correctly handle cancellation of a permissions request
* Redirect to home after disconnecting all sites / cancelling all permissions
* Fix display of site icons in menu
* Fix height of permissions page container
* Remove unused locale messages
* Set default values for openExternalTabs and tabIdOrigins in account-menu.container
* More code cleanup for LoginPerSite-ui
* Use extensions api to close tab in permissions-connect
* Remove unnecessary change in domIsReady() in contentscript
* Remove unnecessary private function markers and class methods (for background tab info) in metamask-controller.
* Adds getOriginOfCurrentTab selector
* Adds IconWithFallback component and substitutes for appropriate cases
* Add and utilize font mixins
* Remove unused method in disconnect-all.container.js
* Simplify buttonSizeLarge code in page-container-footer.component.js
* Add and utilize getAccountsWithLabels selector
* Remove console.log in ui/app/store/actions.js
* Change last connected time format to yyyy-M-d
* Fix css associated with IconWithFallback change
* Ensure tracked openNonMetamaskTabsIDs are correctly set to inactive on tab changes
* Code cleanup for LoginPerSite-ui
* Use reusable function for modifying openNonMetamaskTabsIDs in background.js
* Enables automatic switching to connected account when connected domain is open
* Prevent exploit of tabIdOriginMap in background.js
* Remove unneeded code from contentscript.js
* Simplify current tab origin and window opener logic using remotePort listener tabs.queryTabs
* Design and styling fixes for LoginPerSite-ui
* Fix permissionHistory and permission logging for eth_requestAccounts and eth_accounts
* Front end changes to support display of lastConnected time in connected and permissions screens
* Fix lint errors
* Refactor structure of permissionsHistory
* Fix default values and object modifications for domain and permissionsHistory related data
* Fix connecting to new accounts from modal
* Replace retweet.svg with connect-white.svg
* Fix signature-request.spec
* Update metamask-inpage-provider version
* Fix permissions e2e tests
* Remove unneeded delay from test/e2e/signature-request.spec.js
* Add delay before attempting to retrieve network id in dapp in ethereum-on=.spec
* Use requestAccountTabIds strategy for determining tab id that opened a given window
* Improve default values for permissions requests
* Add some message descriptions to app/_locales/en/messages.json
* Code clean up in permission controller
* Stopped deep cloning object in mapObjectValues
* Bump metamask-inpage-provider version
* Add missing description in app/_locales/en/messages.json
* Return promises from queryTabs and switchToTab of extension.js
* Remove unused getAllPermissions function
* Use default props in icon-with-fallback.component.js
* Stop passing to permissions controller
* Delete no longer used clear-approved-origins modal code
* Remove duplicate imports in ui/app/components/app/index.scss
* Use URL instead of regex in getOriginFromUrl()
* Add runtime error checking to platform, promise based extension.tab methods
* Support permission requests from external extensions
* Improve font size and colour of the domain origin on the permission confirmation screen
* Add support for toggling permissions
* Ensure getRenderablePermissionsDomains only returns domains with exposedAccount caveat permissions
* Remove unused code from LoginPerSite-ui branch
* Ensure modal closes on Enter press for new-account-modal.component.js
* Lint fix
* fixup! Login Per Site UI (#7368)
* Some code cleanup for LoginPerSite
* Adds UX for connecting to dapps via the connected sites screen (#7593)
* Adds UX for connecting to dapps via the connected sites screen
* Use openMetaMaskTabIds from background.js to determine if current active tab is MetaMask
* Delete unused permissions controller methods
* Fixes two small bugs in the LoginPerSite ui (#7595)
* Restore `providerRequest` message translations (#7600)
This message was removed, but it was replaced with a very similar
message called `likeToConnect`. The only difference is that the new
message has "MetaMask" in it. Preserving these messages without
"MetaMask" is probably better than deleting them, so these messages
have all been restored and renamed to `likeToConnect`.
* Login per site no sitemetadata fix (#7610)
* Support connected sites for which we have no site metadata.
* Change property containing subtitle info often populated by origin to a more accurate of purpose name
* Lint fix
* Improve disconnection modal messages (#7612)
* Improve disconnectAccountModalDescription and disconnectAllModalDescription messages
* Update disconnectAccountModalDescription app/_locales/en/messages.json
Co-Authored-By: Mark Stacey <markjstacey@gmail.com>
* Improve disconnectAccount modal message clarity
* Adds cancel button to the account selection screen of the permissions request flow (#7613)
* Fix eth_accounts permission language & selectability (#7614)
* fix eth_accounts language & selectability
* fix MetaMask capitalization in all messages
* Close sidebar when opening connected sites (#7611)
The 'Connected Sites' button in the accounts details now closes the
sidebar, if it is open. This was accomplished by pulling the click
handler for that button up to the wallet view component, where another
button already followed a similar pattern of closing the sidebar.
It seemed confusing to me that one handler was in the `AccountsDetails`
container component, and one was handed down from above, so I added
PropTypes to the container component.
I'm not sure that the WalletView component is the best place for this
logic, but I've put it there for now to be consistent with the add
token button.
* Reject permissions request upon tab close (#7618)
Permissions requests are now rejected when the page is closed. This
only applies to the full-screen view, as that is the view permission
requests should be handled in. The case where the user deals with the
request through a different view is handled in #7617
* Handle tab update failure (#7619)
`extension.tabs.update` can sometimes fail if the user interacts with
the tabs directly around the same time. The redirect flow has been
updated to ensure that the permissions tab is still closed in that
case. The user is on their own to find the dapp tab again in that case.
* Login per site tab popup fixes (#7617)
* Handle redirect in response to state update in permissions-connect
* Ensure origin is available to permissions-connect subcomponents during redirect
* Hide app bar whenever on redirect route
* Improvements to handling of redirects in permissions-connect
* Ensure permission request id change handling only happens when page is not null
* Lint fix
* Decouple confirm transaction screen from the selected address (#7622)
* Avoid race condtion that could prevent contextual account switching (#7623)
There was a race condition in the logic responsible for switching the
selected account based upon the active tab. It was asynchronously
querying the active tab, then assuming it had been retrieved later.
The active tab info itself was already in the redux store in another
spot, one that is guaranteed to be set before the UI renders. The
race condition was avoided by deleting the duplicate state, and using
the other active tab state.
* Only redirect back to dapp if current tab is active (#7621)
The "redirect back to dapp" behaviour can be disruptive when the
permissions connect tab is not active. The purpose of the redirect was
to maintain context between the dapp and the permissions request, but
if the user has already moved to another tab, that no longer applies.
* Fix JSX style lint errors
* Remove unused state
2019-12-03 18:35:56 +01:00
|
|
|
}
|
2021-02-04 19:15:23 +01:00
|
|
|
connectExternal(remotePort);
|
2017-01-12 10:17:05 +01:00
|
|
|
}
|
2022-11-24 14:32:05 +01:00
|
|
|
};
|
2016-09-06 19:24:31 +02:00
|
|
|
|
2018-04-11 18:32:27 +02:00
|
|
|
// communication with page or other extension
|
2022-11-24 14:32:05 +01:00
|
|
|
connectExternal = (remotePort) => {
|
2023-04-25 16:32:51 +02:00
|
|
|
///: BEGIN:ONLY_INCLUDE_IN(desktop)
|
2023-02-20 18:13:12 +01:00
|
|
|
if (
|
|
|
|
DesktopManager.isDesktopEnabled() &&
|
|
|
|
OVERRIDE_ORIGIN.DESKTOP !== overrides?.getOrigin?.()
|
|
|
|
) {
|
|
|
|
DesktopManager.createStream(remotePort, CONNECTION_TYPE_EXTERNAL);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
///: END:ONLY_INCLUDE_IN
|
|
|
|
|
2023-02-14 17:06:19 +01:00
|
|
|
const portStream =
|
|
|
|
overrides?.getPortStream?.(remotePort) || new PortStream(remotePort);
|
2022-01-28 22:42:32 +01:00
|
|
|
controller.setupUntrustedCommunication({
|
|
|
|
connectionStream: portStream,
|
|
|
|
sender: remotePort.sender,
|
|
|
|
});
|
2022-11-24 14:32:05 +01:00
|
|
|
};
|
2018-04-11 18:32:27 +02:00
|
|
|
|
2023-02-14 17:06:19 +01:00
|
|
|
if (overrides?.registerConnectListeners) {
|
|
|
|
overrides.registerConnectListeners(connectRemote, connectExternal);
|
|
|
|
}
|
|
|
|
|
2017-01-12 10:17:05 +01:00
|
|
|
//
|
|
|
|
// User Interface setup
|
|
|
|
//
|
|
|
|
|
2023-05-11 07:56:17 +02:00
|
|
|
controller.txController.initApprovals().then(() => {
|
|
|
|
updateBadge();
|
|
|
|
});
|
2021-02-09 00:22:30 +01:00
|
|
|
controller.txController.on(
|
|
|
|
METAMASK_CONTROLLER_EVENTS.UPDATE_BADGE,
|
|
|
|
updateBadge,
|
|
|
|
);
|
2023-04-26 17:02:33 +02:00
|
|
|
controller.decryptMessageController.hub.on(
|
2021-02-09 00:22:30 +01:00
|
|
|
METAMASK_CONTROLLER_EVENTS.UPDATE_BADGE,
|
|
|
|
updateBadge,
|
|
|
|
);
|
2023-04-13 10:24:59 +02:00
|
|
|
controller.encryptionPublicKeyController.hub.on(
|
2021-02-09 00:22:30 +01:00
|
|
|
METAMASK_CONTROLLER_EVENTS.UPDATE_BADGE,
|
|
|
|
updateBadge,
|
|
|
|
);
|
2023-05-05 14:05:52 +02:00
|
|
|
controller.signatureController.hub.on(
|
2021-02-09 00:22:30 +01:00
|
|
|
METAMASK_CONTROLLER_EVENTS.UPDATE_BADGE,
|
|
|
|
updateBadge,
|
|
|
|
);
|
|
|
|
controller.appStateController.on(
|
|
|
|
METAMASK_CONTROLLER_EVENTS.UPDATE_BADGE,
|
|
|
|
updateBadge,
|
|
|
|
);
|
2017-01-12 10:17:05 +01:00
|
|
|
|
2021-08-31 21:27:13 +02:00
|
|
|
controller.controllerMessenger.subscribe(
|
|
|
|
METAMASK_CONTROLLER_EVENTS.APPROVAL_STATE_CHANGE,
|
|
|
|
updateBadge,
|
|
|
|
);
|
|
|
|
|
2018-04-20 19:40:53 +02:00
|
|
|
/**
|
2018-04-19 20:23:15 +02:00
|
|
|
* Updates the Web Extension's "badge" number, on the little fox in the toolbar.
|
|
|
|
* The number reflects the current number of pending transactions or message signatures needing user approval.
|
|
|
|
*/
|
2020-11-03 00:41:28 +01:00
|
|
|
function updateBadge() {
|
2021-02-04 19:15:23 +01:00
|
|
|
let label = '';
|
2022-01-05 18:09:19 +01:00
|
|
|
const count = getUnapprovedTransactionCount();
|
|
|
|
if (count) {
|
|
|
|
label = String(count);
|
|
|
|
}
|
2022-05-26 06:48:23 +02:00
|
|
|
// browserAction has been replaced by action in MV3
|
2022-08-16 17:21:42 +02:00
|
|
|
if (isManifestV3) {
|
2022-05-26 06:48:23 +02:00
|
|
|
browser.action.setBadgeText({ text: label });
|
|
|
|
browser.action.setBadgeBackgroundColor({ color: '#037DD6' });
|
|
|
|
} else {
|
|
|
|
browser.browserAction.setBadgeText({ text: label });
|
|
|
|
browser.browserAction.setBadgeBackgroundColor({ color: '#037DD6' });
|
|
|
|
}
|
2022-01-05 18:09:19 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
function getUnapprovedTransactionCount() {
|
2022-07-31 20:26:40 +02:00
|
|
|
const pendingApprovalCount =
|
|
|
|
controller.approvalController.getTotalApprovalCount();
|
2020-11-03 00:41:28 +01:00
|
|
|
const waitingForUnlockCount =
|
2021-02-04 19:15:23 +01:00
|
|
|
controller.appStateController.waitingForUnlock.length;
|
2023-04-26 17:02:33 +02:00
|
|
|
return pendingApprovalCount + waitingForUnlockCount;
|
2017-01-12 10:17:05 +01:00
|
|
|
}
|
2016-04-15 22:04:17 +02:00
|
|
|
|
2021-11-15 17:13:51 +01:00
|
|
|
notificationManager.on(
|
|
|
|
NOTIFICATION_MANAGER_EVENTS.POPUP_CLOSED,
|
2022-01-05 18:09:19 +01:00
|
|
|
({ automaticallyClosed }) => {
|
|
|
|
if (!automaticallyClosed) {
|
|
|
|
rejectUnapprovedNotifications();
|
|
|
|
} else if (getUnapprovedTransactionCount() > 0) {
|
|
|
|
triggerUi();
|
|
|
|
}
|
|
|
|
},
|
2021-11-15 17:13:51 +01:00
|
|
|
);
|
|
|
|
|
|
|
|
function rejectUnapprovedNotifications() {
|
|
|
|
Object.keys(
|
|
|
|
controller.txController.txStateManager.getUnapprovedTxList(),
|
|
|
|
).forEach((txId) =>
|
|
|
|
controller.txController.txStateManager.setTxStatusRejected(txId),
|
|
|
|
);
|
2023-05-05 14:05:52 +02:00
|
|
|
controller.signatureController.rejectUnapproved(
|
|
|
|
REJECT_NOTIFICATION_CLOSE_SIG,
|
|
|
|
);
|
2023-04-26 17:02:33 +02:00
|
|
|
controller.decryptMessageController.rejectUnapproved(
|
|
|
|
REJECT_NOTIFICATION_CLOSE,
|
|
|
|
);
|
2023-04-13 10:24:59 +02:00
|
|
|
controller.encryptionPublicKeyController.rejectUnapproved(
|
|
|
|
REJECT_NOTIFICATION_CLOSE,
|
|
|
|
);
|
2021-11-15 17:13:51 +01:00
|
|
|
|
2022-12-21 20:15:52 +01:00
|
|
|
// Finally, resolve snap dialog approvals on Flask and reject all the others managed by the ApprovalController.
|
|
|
|
Object.values(controller.approvalController.state.pendingApprovals).forEach(
|
|
|
|
({ id, type }) => {
|
|
|
|
switch (type) {
|
2023-04-25 16:32:51 +02:00
|
|
|
///: BEGIN:ONLY_INCLUDE_IN(snaps)
|
2023-05-10 07:36:01 +02:00
|
|
|
case ApprovalType.SnapDialogAlert:
|
|
|
|
case ApprovalType.SnapDialogPrompt:
|
2022-12-21 20:15:52 +01:00
|
|
|
controller.approvalController.accept(id, null);
|
|
|
|
break;
|
2023-05-10 07:36:01 +02:00
|
|
|
case ApprovalType.SnapDialogConfirmation:
|
2022-12-21 20:15:52 +01:00
|
|
|
controller.approvalController.accept(id, false);
|
|
|
|
break;
|
|
|
|
///: END:ONLY_INCLUDE_IN
|
|
|
|
default:
|
|
|
|
controller.approvalController.reject(
|
|
|
|
id,
|
|
|
|
ethErrors.provider.userRejectedRequest(),
|
|
|
|
);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
},
|
2022-01-03 21:39:41 +01:00
|
|
|
);
|
2021-11-15 17:13:51 +01:00
|
|
|
|
|
|
|
updateBadge();
|
|
|
|
}
|
2023-02-20 18:13:12 +01:00
|
|
|
|
2023-04-25 16:32:51 +02:00
|
|
|
///: BEGIN:ONLY_INCLUDE_IN(desktop)
|
2023-02-20 18:13:12 +01:00
|
|
|
if (OVERRIDE_ORIGIN.DESKTOP !== overrides?.getOrigin?.()) {
|
|
|
|
controller.store.subscribe((state) => {
|
|
|
|
DesktopManager.setState(state);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
///: END:ONLY_INCLUDE_IN
|
2016-02-11 02:44:46 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
//
|
2017-01-12 10:17:05 +01:00
|
|
|
// Etc...
|
2016-02-11 02:44:46 +01:00
|
|
|
//
|
|
|
|
|
2018-04-20 19:40:53 +02:00
|
|
|
/**
|
2018-04-19 20:23:15 +02:00
|
|
|
* Opens the browser popup for user confirmation
|
|
|
|
*/
|
2020-11-03 00:41:28 +01:00
|
|
|
async function triggerUi() {
|
2021-02-04 19:15:23 +01:00
|
|
|
const tabs = await platform.getActiveTabs();
|
2020-11-03 00:41:28 +01:00
|
|
|
const currentlyActiveMetamaskTab = Boolean(
|
|
|
|
tabs.find((tab) => openMetamaskTabsIDs[tab.id]),
|
2021-02-04 19:15:23 +01:00
|
|
|
);
|
2020-11-06 19:38:48 +01:00
|
|
|
// Vivaldi is not closing port connection on popup close, so popupIsOpen does not work correctly
|
|
|
|
// To be reviewed in the future if this behaviour is fixed - also the way we determine isVivaldi variable might change at some point
|
|
|
|
const isVivaldi =
|
|
|
|
tabs.length > 0 &&
|
|
|
|
tabs[0].extData &&
|
2021-02-04 19:15:23 +01:00
|
|
|
tabs[0].extData.indexOf('vivaldi_tab') > -1;
|
2021-02-11 23:07:56 +01:00
|
|
|
if (
|
|
|
|
!uiIsTriggering &&
|
|
|
|
(isVivaldi || !popupIsOpen) &&
|
|
|
|
!currentlyActiveMetamaskTab
|
|
|
|
) {
|
|
|
|
uiIsTriggering = true;
|
|
|
|
try {
|
2023-03-02 17:50:00 +01:00
|
|
|
const currentPopupId = controller.appStateController.getCurrentPopupId();
|
|
|
|
await notificationManager.showPopup(
|
|
|
|
(newPopupId) =>
|
|
|
|
controller.appStateController.setCurrentPopupId(newPopupId),
|
|
|
|
currentPopupId,
|
|
|
|
);
|
2021-02-11 23:07:56 +01:00
|
|
|
} finally {
|
|
|
|
uiIsTriggering = false;
|
|
|
|
}
|
2020-04-11 17:12:45 +02:00
|
|
|
}
|
2017-01-12 07:47:56 +01:00
|
|
|
}
|
2015-12-19 07:05:16 +01:00
|
|
|
|
2022-08-11 19:33:33 +02:00
|
|
|
// It adds the "App Installed" event into a queue of events, which will be tracked only after a user opts into metrics.
|
|
|
|
const addAppInstalledEvent = () => {
|
|
|
|
if (controller) {
|
|
|
|
controller.metaMetricsController.updateTraits({
|
2023-04-03 17:31:04 +02:00
|
|
|
[MetaMetricsUserTrait.InstallDateExt]: new Date()
|
|
|
|
.toISOString()
|
|
|
|
.split('T')[0], // yyyy-mm-dd
|
2022-08-11 19:33:33 +02:00
|
|
|
});
|
|
|
|
controller.metaMetricsController.addEventBeforeMetricsOptIn({
|
2023-04-03 17:31:04 +02:00
|
|
|
category: MetaMetricsEventCategory.App,
|
|
|
|
event: MetaMetricsEventName.AppInstalled,
|
2022-08-11 19:33:33 +02:00
|
|
|
properties: {},
|
|
|
|
});
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
setTimeout(() => {
|
|
|
|
// If the controller is not set yet, we wait and try to add the "App Installed" event again.
|
|
|
|
addAppInstalledEvent();
|
|
|
|
}, 1000);
|
|
|
|
};
|
|
|
|
|
2018-11-26 17:30:04 +01:00
|
|
|
// On first install, open a new tab with MetaMask
|
2022-03-18 20:07:05 +01:00
|
|
|
browser.runtime.onInstalled.addListener(({ reason }) => {
|
2020-11-03 00:41:28 +01:00
|
|
|
if (
|
|
|
|
reason === 'install' &&
|
|
|
|
!(process.env.METAMASK_DEBUG || process.env.IN_TEST)
|
|
|
|
) {
|
2022-08-11 19:33:33 +02:00
|
|
|
addAppInstalledEvent();
|
2021-02-04 19:15:23 +01:00
|
|
|
platform.openExtensionInBrowser();
|
2018-11-26 17:24:08 +01:00
|
|
|
}
|
2021-02-04 19:15:23 +01:00
|
|
|
});
|
2022-07-22 22:39:48 +02:00
|
|
|
|
|
|
|
function setupSentryGetStateGlobal(store) {
|
2022-11-09 20:28:32 +01:00
|
|
|
global.stateHooks.getSentryState = function () {
|
2022-07-22 22:39:48 +02:00
|
|
|
const fullState = store.getState();
|
2022-08-18 19:55:28 +02:00
|
|
|
const debugState = maskObject({ metamask: fullState }, SENTRY_STATE);
|
2022-07-22 22:39:48 +02:00
|
|
|
return {
|
|
|
|
browser: window.navigator.userAgent,
|
|
|
|
store: debugState,
|
2022-08-18 19:55:28 +02:00
|
|
|
version: platform.getVersion(),
|
2022-07-22 22:39:48 +02:00
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|
2023-02-14 17:06:19 +01:00
|
|
|
|
|
|
|
function initBackground() {
|
|
|
|
initialize().catch(log.error);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!process.env.SKIP_BACKGROUND_INITIALIZATION) {
|
|
|
|
initBackground();
|
|
|
|
}
|