1
0
mirror of https://github.com/kremalicious/metamask-extension.git synced 2024-10-23 03:36:18 +02:00
metamask-extension/app/scripts/contentscript.js

282 lines
8.5 KiB
JavaScript
Raw Normal View History

const fs = require('fs')
const path = require('path')
const pump = require('pump')
const querystring = require('querystring')
const LocalMessageDuplexStream = require('post-message-stream')
const PongStream = require('ping-pong-stream/pong')
const ObjectMultiplex = require('obj-multiplex')
const extension = require('extensionizer')
const PortStream = require('extension-port-stream')
2016-05-06 01:04:43 +02:00
const inpageContent = fs.readFileSync(path.join(__dirname, '..', '..', 'dist', 'chrome', 'inpage.js')).toString()
const inpageSuffix = '//# sourceURL=' + extension.extension.getURL('inpage.js') + '\n'
const inpageBundle = inpageContent + inpageSuffix
2018-09-27 20:19:09 +02:00
let originApproved = false
// Eventually this streaming injection could be replaced with:
// https://developer.mozilla.org/en-US/docs/Mozilla/Tech/XPCOM/Language_Bindings/Components.utils.exportFunction
//
// But for now that is only Firefox
// If we create a FireFox-only code path using that API,
// MetaMask will be much faster loading and performant on Firefox.
if (shouldInjectWeb3()) {
2018-09-27 20:19:09 +02:00
injectScript(inpageBundle)
setupStreams()
2018-09-27 20:19:09 +02:00
listenForProviderRequest()
2018-10-10 20:52:26 +02:00
checkPrivacyMode()
}
/**
2018-09-27 20:19:09 +02:00
* Injects a script tag into the current document
*
* @param {string} content - Code to be executed in the current document
*/
2018-09-27 20:19:09 +02:00
function injectScript (content) {
try {
2018-09-27 20:19:09 +02:00
const container = document.head || document.documentElement
const scriptTag = document.createElement('script')
scriptTag.textContent = content
container.insertBefore(scriptTag, container.children[0])
} catch (e) {
2018-09-27 20:19:09 +02:00
console.error('Metamask script injection failed.', e)
}
}
/**
* Sets up two-way communication streams between the
* browser extension and local per-page browser context
*/
2016-11-11 19:26:12 +01:00
function setupStreams () {
// setup communication to page and plugin
const pageStream = new LocalMessageDuplexStream({
name: 'contentscript',
target: 'inpage',
})
const pluginPort = extension.runtime.connect({ name: 'contentscript' })
const pluginStream = new PortStream(pluginPort)
2018-09-27 20:19:09 +02:00
// Until this origin is approved, cut-off publicConfig stream writes at the content
// script level so malicious sites can't snoop on the currently-selected address
pageStream._write = function (data, encoding, cb) {
if (typeof data === 'object' && data.name && data.name === 'publicConfig' && !originApproved) {
cb()
return
}
LocalMessageDuplexStream.prototype._write.apply(pageStream, arguments)
}
// forward communication plugin->inpage
pump(
pageStream,
pluginStream,
pageStream,
(err) => logStreamDisconnectWarning('MetaMask Contentscript Forwarding', err)
)
// setup local multistream channels
const mux = new ObjectMultiplex()
mux.setMaxListeners(25)
pump(
mux,
pageStream,
mux,
(err) => logStreamDisconnectWarning('MetaMask Inpage', err)
)
pump(
mux,
pluginStream,
mux,
(err) => logStreamDisconnectWarning('MetaMask Background', err)
)
// connect ping stream
const pongStream = new PongStream({ objectMode: true })
pump(
mux,
pongStream,
mux,
(err) => logStreamDisconnectWarning('MetaMask PingPongStream', err)
)
// connect phishing warning stream
const phishingStream = mux.createStream('phishing')
phishingStream.once('data', redirectToPhishingWarning)
// ignore unused channels (handled by background, inpage)
mux.ignoreStream('provider')
mux.ignoreStream('publicConfig')
}
2018-09-27 20:19:09 +02:00
/**
* Establishes listeners for requests to fully-enable the provider from the dapp context
* and for full-provider approvals and rejections from the background script context. Dapps
* should not post messages directly and should instead call provider.enable(), which
* handles posting these messages automatically.
*/
function listenForProviderRequest () {
window.addEventListener('message', ({ source, data }) => {
if (source !== window || !data || !data.type) { return }
switch (data.type) {
case 'ETHEREUM_ENABLE_PROVIDER':
extension.runtime.sendMessage({
action: 'init-provider-request',
origin: source.location.hostname,
})
break
2018-10-10 20:52:26 +02:00
case 'ETHEREUM_QUERY_STATUS':
extension.runtime.sendMessage({
2018-10-10 20:52:26 +02:00
action: 'init-status-request',
origin: source.location.hostname,
})
break
2018-10-18 00:38:31 +02:00
case 'METAMASK_UNLOCK_STATUS':
extension.runtime.sendMessage({
action: 'init-unlock-request',
})
break
}
2018-09-27 20:19:09 +02:00
})
2018-10-18 00:38:31 +02:00
extension.runtime.onMessage.addListener(({ action, isEnabled, isUnlocked }) => {
2018-09-27 20:19:09 +02:00
if (!action) { return }
switch (action) {
case 'approve-provider-request':
originApproved = true
injectScript(`window.dispatchEvent(new CustomEvent('ethereumprovider', { detail: {}}))`)
break
case 'reject-provider-request':
injectScript(`window.dispatchEvent(new CustomEvent('ethereumprovider', { detail: { error: 'User rejected provider access' }}))`)
break
2018-10-10 20:52:26 +02:00
case 'answer-status-request':
injectScript(`window.dispatchEvent(new CustomEvent('ethereumproviderstatus', { detail: { isEnabled: ${isEnabled}}}))`)
break
2018-10-18 00:38:31 +02:00
case 'answer-unlock-request':
injectScript(`window.dispatchEvent(new CustomEvent('metamaskunlockstatus', { detail: { isUnlocked: ${isUnlocked}}}))`)
break
2018-09-27 20:19:09 +02:00
}
})
}
/**
2018-10-10 20:52:26 +02:00
* Checks if MetaMask is currently operating in "privacy mode", meaning
* dapps must call ethereum.enable in order to access user accounts
*/
2018-10-10 20:52:26 +02:00
function checkPrivacyMode () {
extension.runtime.sendMessage({ action: 'init-privacy-request' })
}
/**
* Error handler for page to plugin stream disconnections
*
* @param {string} remoteLabel Remote stream name
* @param {Error} err Stream connection error
*/
function logStreamDisconnectWarning (remoteLabel, err) {
let warningMsg = `MetamaskContentscript - lost connection to ${remoteLabel}`
if (err) warningMsg += '\n' + err.stack
console.warn(warningMsg)
}
/**
* Determines if Web3 should be injected
*
2018-04-19 21:12:04 +02:00
* @returns {boolean} {@code true} if Web3 should be injected
*/
2016-11-11 19:26:12 +01:00
function shouldInjectWeb3 () {
2018-07-03 00:49:33 +02:00
return doctypeCheck() && suffixCheck() &&
documentElementCheck() && !blacklistedDomainCheck()
2016-10-16 00:33:49 +02:00
}
/**
* Checks the doctype of the current document if it exists
*
2018-04-19 21:12:04 +02:00
* @returns {boolean} {@code true} if the doctype is html or if none exists
*/
2017-03-28 20:30:39 +02:00
function doctypeCheck () {
2017-03-22 19:25:56 +01:00
const doctype = window.document.doctype
if (doctype) {
return doctype.name === 'html'
} else {
return true
2016-10-16 00:33:49 +02:00
}
}
2017-03-28 20:30:39 +02:00
/**
* Returns whether or not the extension (suffix) of the current document is prohibited
*
* This checks {@code window.location.pathname} against a set of file extensions
* that should not have web3 injected into them. This check is indifferent of query parameters
* in the location.
*
* @returns {boolean} whether or not the extension of the current document is prohibited
*/
2017-04-27 06:05:45 +02:00
function suffixCheck () {
const prohibitedTypes = [
/\.xml$/,
/\.pdf$/,
]
const currentUrl = window.location.pathname
2017-03-28 20:30:39 +02:00
for (let i = 0; i < prohibitedTypes.length; i++) {
if (prohibitedTypes[i].test(currentUrl)) {
2017-03-28 20:30:39 +02:00
return false
}
}
return true
}
/**
* Checks the documentElement of the current document
*
2018-04-19 21:12:04 +02:00
* @returns {boolean} {@code true} if the documentElement is an html node or if none exists
*/
function documentElementCheck () {
var documentElement = document.documentElement.nodeName
if (documentElement) {
return documentElement.toLowerCase() === 'html'
}
return true
}
/**
* Checks if the current domain is blacklisted
*
2018-04-19 21:12:04 +02:00
* @returns {boolean} {@code true} if the current domain is blacklisted
*/
function blacklistedDomainCheck () {
2018-04-04 05:33:19 +02:00
var blacklistedDomains = [
'uscourts.gov',
'dropbox.com',
'webbyawards.com',
2018-04-30 23:35:47 +02:00
'cdn.shopify.com/s/javascripts/tricorder/xtld-read-only-frame.html',
2018-05-18 16:11:46 +02:00
'adyen.com',
'gravityforms.com',
'harbourair.com',
'ani.gamer.com.tw',
'blueskybooking.com',
2018-04-04 05:33:19 +02:00
]
var currentUrl = window.location.href
var currentRegex
for (let i = 0; i < blacklistedDomains.length; i++) {
const blacklistedDomain = blacklistedDomains[i].replace('.', '\\.')
currentRegex = new RegExp(`(?:https?:\\/\\/)(?:(?!${blacklistedDomain}).)*$`)
if (!currentRegex.test(currentUrl)) {
return true
}
}
return false
}
/**
* Redirects the current page to a phishing information page
*/
function redirectToPhishingWarning () {
console.log('MetaMask - routing to Phishing Warning component')
2018-07-30 23:50:05 +02:00
const extensionURL = extension.runtime.getURL('phishing.html')
window.location.href = `${extensionURL}#${querystring.stringify({
hostname: window.location.hostname,
href: window.location.href,
})}`
}