/** * @file The entry point for the web extension singleton process. */ import EventEmitter from 'events'; import endOfStream from 'end-of-stream'; import pump from 'pump'; import debounce from 'debounce-stream'; import log from 'loglevel'; import browser from 'webextension-polyfill'; import { storeAsStream } from '@metamask/obs-store'; import PortStream from 'extension-port-stream'; import { ethErrors } from 'eth-rpc-errors'; import { ENVIRONMENT_TYPE_POPUP, ENVIRONMENT_TYPE_NOTIFICATION, ENVIRONMENT_TYPE_FULLSCREEN, EXTENSION_MESSAGES, PLATFORM_FIREFOX, ///: BEGIN:ONLY_INCLUDE_IN(snaps) MESSAGE_TYPE, ///: END:ONLY_INCLUDE_IN } from '../../shared/constants/app'; import { REJECT_NOTIFICATION_CLOSE, REJECT_NOTIFICATION_CLOSE_SIG, MetaMetricsEventCategory, MetaMetricsEventName, MetaMetricsUserTrait, } from '../../shared/constants/metametrics'; import { checkForLastErrorAndLog } from '../../shared/modules/browser-runtime.utils'; import { isManifestV3 } from '../../shared/modules/mv3.utils'; import { maskObject } from '../../shared/modules/object.utils'; import { getEnvironmentType, deferredPromise, getPlatform } from './lib/util'; import migrations from './migrations'; import Migrator from './lib/migrator'; import ExtensionPlatform from './platforms/extension'; import LocalStore from './lib/local-store'; import ReadOnlyNetworkStore from './lib/network-store'; import { SENTRY_STATE } from './lib/setupSentry'; import createStreamSink from './lib/createStreamSink'; import NotificationManager, { NOTIFICATION_MANAGER_EVENTS, } from './lib/notification-manager'; import MetamaskController, { METAMASK_CONTROLLER_EVENTS, } from './metamask-controller'; import rawFirstTimeState from './first-time-state'; import getFirstPreferredLangCode from './lib/get-first-preferred-lang-code'; import getObjStructure from './lib/getObjStructure'; import setupEnsIpfsResolver from './lib/ens-ipfs/setup'; /* eslint-enable import/first */ /* eslint-disable import/order */ ///: BEGIN:ONLY_INCLUDE_IN(desktop) import { CONNECTION_TYPE_EXTERNAL, CONNECTION_TYPE_INTERNAL, } from '@metamask/desktop/dist/constants'; import DesktopManager from '@metamask/desktop/dist/desktop-manager'; ///: END:ONLY_INCLUDE_IN /* eslint-enable import/order */ const { sentry } = global; const firstTimeState = { ...rawFirstTimeState }; const metamaskInternalProcessHash = { [ENVIRONMENT_TYPE_POPUP]: true, [ENVIRONMENT_TYPE_NOTIFICATION]: true, [ENVIRONMENT_TYPE_FULLSCREEN]: true, }; const metamaskBlockedPorts = ['trezor-connect']; log.setDefaultLevel(process.env.METAMASK_DEBUG ? 'debug' : 'info'); const platform = new ExtensionPlatform(); const notificationManager = new NotificationManager(); let popupIsOpen = false; let notificationIsOpen = false; let uiIsTriggering = false; const openMetamaskTabsIDs = {}; const openMetamaskConnections = new Map(); const requestAccountTabIds = {}; let controller; // state persistence const inTest = process.env.IN_TEST; const localStore = inTest ? new ReadOnlyNetworkStore() : new LocalStore(); let versionedData; if (inTest || process.env.METAMASK_DEBUG) { global.stateHooks.metamaskGetState = localStore.get.bind(localStore); } const phishingPageUrl = new URL(process.env.PHISHING_WARNING_PAGE_URL); const ONE_SECOND_IN_MILLISECONDS = 1_000; // Timeout for initializing phishing warning page. const PHISHING_WARNING_PAGE_TIMEOUT = ONE_SECOND_IN_MILLISECONDS; const ACK_KEEP_ALIVE_MESSAGE = 'ACK_KEEP_ALIVE_MESSAGE'; const WORKER_KEEP_ALIVE_MESSAGE = 'WORKER_KEEP_ALIVE_MESSAGE'; ///: BEGIN:ONLY_INCLUDE_IN(desktop) const OVERRIDE_ORIGIN = { EXTENSION: 'EXTENSION', DESKTOP: 'DESKTOP_APP', }; ///: END:ONLY_INCLUDE_IN // Event emitter for state persistence export const statePersistenceEvents = new EventEmitter(); /** * This deferred Promise is used to track whether initialization has finished. * * It is very important to ensure that `resolveInitialization` is *always* * called once initialization has completed, and that `rejectInitialization` is * called if initialization fails in an unrecoverable way. */ const { promise: isInitialized, resolve: resolveInitialization, reject: rejectInitialization, } = deferredPromise(); /** * Sends a message to the dapp(s) content script to signal it can connect to MetaMask background as * the backend is not active. It is required to re-connect dapps after service worker re-activates. * For non-dapp pages, the message will be sent and ignored. */ const sendReadyMessageToTabs = async () => { const tabs = await browser.tabs .query({ /** * Only query tabs that our extension can run in. To do this, we query for all URLs that our * extension can inject scripts in, which is by using the "" value and __without__ * the "tabs" manifest permission. If we included the "tabs" permission, this would also fetch * URLs that we'd not be able to inject in, e.g. chrome://pages, chrome://extension, which * is not what we'd want. * * You might be wondering, how does the "url" param work without the "tabs" permission? * * @see {@link https://bugs.chromium.org/p/chromium/issues/detail?id=661311#c1} * "If the extension has access to inject scripts into Tab, then we can return the url * of Tab (because the extension could just inject a script to message the location.href)." */ url: '', windowType: 'normal', }) .then((result) => { checkForLastErrorAndLog(); return result; }) .catch(() => { checkForLastErrorAndLog(); }); /** @todo we should only sendMessage to dapp tabs, not all tabs. */ for (const tab of tabs) { browser.tabs .sendMessage(tab.id, { name: EXTENSION_MESSAGES.READY, }) .then(() => { checkForLastErrorAndLog(); }) .catch(() => { // An error may happen if the contentscript is blocked from loading, // and thus there is no runtime.onMessage handler to listen to the message. checkForLastErrorAndLog(); }); } }; // These are set after initialization let connectRemote; let connectExternal; browser.runtime.onConnect.addListener(async (...args) => { // Queue up connection attempts here, waiting until after initialization await isInitialized; const remotePort = args[0]; const { sender } = remotePort; const url = sender?.url; const detectedProcessName = url ? getEnvironmentType(url) : ''; const connectionId = generateConnectionId(remotePort, detectedProcessName); const openConnections = openMetamaskConnections.get(connectionId) || 0; if ( openConnections === 0 || (detectedProcessName === 'background' && openConnections < 2) // 2 background connections are allowed, one for phishing warning page and one for the ledger bridge keyring ) { // This is set in `setupController`, which is called as part of initialization connectRemote(...args); openMetamaskConnections.set(connectionId, openConnections + 1); } else { throw new Error('CONNECTION_ALREADY_EXISTS'); } }); browser.runtime.onConnectExternal.addListener(async (...args) => { // Queue up connection attempts here, waiting until after initialization await isInitialized; // This is set in `setupController`, which is called as part of initialization connectExternal(...args); }); /** * @typedef {import('../../shared/constants/transaction').TransactionMeta} TransactionMeta */ /** * The data emitted from the MetaMaskController.store EventEmitter, also used to initialize the MetaMaskController. Available in UI on React state as state.metamask. * * @typedef MetaMaskState * @property {boolean} isInitialized - Whether the first vault has been created. * @property {boolean} isUnlocked - Whether the vault is currently decrypted and accounts are available for selection. * @property {boolean} isAccountMenuOpen - Represents whether the main account selection UI is currently displayed. * @property {boolean} isNetworkMenuOpen - Represents whether the main network selection UI is currently displayed. * @property {object} identities - An object matching lower-case hex addresses to Identity objects with "address" and "name" (nickname) keys. * @property {object} unapprovedTxs - An object mapping transaction hashes to unapproved transactions. * @property {object} networkConfigurations - A list of network configurations, containing RPC provider details (eg chainId, rpcUrl, rpcPreferences). * @property {Array} addressBook - A list of previously sent to addresses. * @property {object} contractExchangeRates - Info about current token prices. * @property {Array} tokens - Tokens held by the current user, including their balances. * @property {object} send - TODO: Document * @property {boolean} useBlockie - Indicates preferred user identicon format. True for blockie, false for Jazzicon. * @property {object} featureFlags - An object for optional feature flags. * @property {boolean} welcomeScreen - True if welcome screen should be shown. * @property {string} currentLocale - A locale string matching the user's preferred display language. * @property {object} providerConfig - The current selected network provider. * @property {string} providerConfig.rpcUrl - The address for the RPC API, if using an RPC API. * @property {string} providerConfig.type - An identifier for the type of network selected, allows MetaMask to use custom provider strategies for known networks. * @property {string} networkId - The stringified number of the current network ID. * @property {string} networkStatus - Either "unknown", "available", "unavailable", or "blocked", depending on the status of the currently selected network. * @property {object} accounts - An object mapping lower-case hex addresses to objects with "balance" and "address" keys, both storing hex string values. * @property {hex} currentBlockGasLimit - The most recently seen block gas limit, in a lower case hex prefixed string. * @property {TransactionMeta[]} currentNetworkTxList - An array of transactions associated with the currently selected network. * @property {object} unapprovedMsgs - An object of messages pending approval, mapping a unique ID to the options. * @property {number} unapprovedMsgCount - The number of messages in unapprovedMsgs. * @property {object} unapprovedPersonalMsgs - An object of messages pending approval, mapping a unique ID to the options. * @property {number} unapprovedPersonalMsgCount - The number of messages in unapprovedPersonalMsgs. * @property {object} unapprovedEncryptionPublicKeyMsgs - An object of messages pending approval, mapping a unique ID to the options. * @property {number} unapprovedEncryptionPublicKeyMsgCount - The number of messages in EncryptionPublicKeyMsgs. * @property {object} unapprovedDecryptMsgs - An object of messages pending approval, mapping a unique ID to the options. * @property {number} unapprovedDecryptMsgCount - The number of messages in unapprovedDecryptMsgs. * @property {object} unapprovedTypedMsgs - An object of messages pending approval, mapping a unique ID to the options. * @property {number} unapprovedTypedMsgCount - The number of messages in unapprovedTypedMsgs. * @property {number} pendingApprovalCount - The number of pending request in the approval controller. * @property {string[]} keyringTypes - An array of unique keyring identifying strings, representing available strategies for creating accounts. * @property {Keyring[]} keyrings - An array of keyring descriptions, summarizing the accounts that are available for use, and what keyrings they belong to. * @property {string} selectedAddress - A lower case hex string of the currently selected address. * @property {string} currentCurrency - A string identifying the user's preferred display currency, for use in showing conversion rates. * @property {number} conversionRate - A number representing the current exchange rate from the user's preferred currency to Ether. * @property {number} conversionDate - A unix epoch date (ms) for the time the current conversion rate was last retrieved. * @property {boolean} forgottenPassword - Returns true if the user has initiated the password recovery screen, is recovering from seed phrase. */ /** * @typedef VersionedData * @property {MetaMaskState} data - The data emitted from MetaMask controller, or used to initialize it. * @property {number} version - The latest migration version that has been run. */ /** * Initializes the MetaMask controller, and sets up all platform configuration. * * @returns {Promise} Setup complete. */ async function initialize() { try { const initState = await loadStateFromPersistence(); const initLangCode = await getFirstPreferredLangCode(); ///: BEGIN:ONLY_INCLUDE_IN(desktop) await DesktopManager.init(platform.getVersion()); ///: END:ONLY_INCLUDE_IN let isFirstMetaMaskControllerSetup; if (isManifestV3) { const sessionData = await browser.storage.session.get([ 'isFirstMetaMaskControllerSetup', ]); isFirstMetaMaskControllerSetup = sessionData?.isFirstMetaMaskControllerSetup === undefined; await browser.storage.session.set({ isFirstMetaMaskControllerSetup }); } setupController( initState, initLangCode, {}, isFirstMetaMaskControllerSetup, ); if (!isManifestV3) { await loadPhishingWarningPage(); } await sendReadyMessageToTabs(); log.info('MetaMask initialization complete.'); resolveInitialization(); } catch (error) { rejectInitialization(error); } } /** * An error thrown if the phishing warning page takes too long to load. */ class PhishingWarningPageTimeoutError extends Error { constructor() { super('Timeout failed'); } } /** * Load the phishing warning page temporarily to ensure the service * worker has been registered, so that the warning page works offline. */ async function loadPhishingWarningPage() { let iframe; try { const extensionStartupPhishingPageUrl = new URL( process.env.PHISHING_WARNING_PAGE_URL, ); // The `extensionStartup` hash signals to the phishing warning page that it should not bother // setting up streams for user interaction. Otherwise this page load would cause a console // error. extensionStartupPhishingPageUrl.hash = '#extensionStartup'; iframe = window.document.createElement('iframe'); iframe.setAttribute('src', extensionStartupPhishingPageUrl.href); iframe.setAttribute('sandbox', 'allow-scripts allow-same-origin'); // Create "deferred Promise" to allow passing resolve/reject to event handlers let deferredResolve; let deferredReject; const loadComplete = new Promise((resolve, reject) => { deferredResolve = resolve; deferredReject = reject; }); // The load event is emitted once loading has completed, even if the loading failed. // If loading failed we can't do anything about it, so we don't need to check. iframe.addEventListener('load', deferredResolve); // This step initiates the page loading. window.document.body.appendChild(iframe); // This timeout ensures that this iframe gets cleaned up in a reasonable // timeframe, and ensures that the "initialization complete" message // doesn't get delayed too long. setTimeout( () => deferredReject(new PhishingWarningPageTimeoutError()), PHISHING_WARNING_PAGE_TIMEOUT, ); await loadComplete; } catch (error) { if (error instanceof PhishingWarningPageTimeoutError) { console.warn( 'Phishing warning page timeout; page not guaraneteed to work offline.', ); } else { console.error('Failed to initialize phishing warning page', error); } } finally { if (iframe) { iframe.remove(); } } } // // State and Persistence // /** * Loads any stored data, prioritizing the latest storage strategy. * Migrates that data schema in case it was last loaded on an older version. * * @returns {Promise} Last data emitted from previous instance of MetaMask. */ export async function loadStateFromPersistence() { // migrations const migrator = new Migrator({ migrations }); migrator.on('error', console.warn); // read from disk // first from preferred, async API: versionedData = (await localStore.get()) || migrator.generateInitialState(firstTimeState); // check if somehow state is empty // this should never happen but new error reporting suggests that it has // for a small number of users // https://github.com/metamask/metamask-extension/issues/3919 if (versionedData && !versionedData.data) { // unable to recover, clear state versionedData = migrator.generateInitialState(firstTimeState); sentry.captureMessage('MetaMask - Empty vault found - unable to recover'); } // report migration errors to sentry migrator.on('error', (err) => { // get vault structure without secrets const vaultStructure = getObjStructure(versionedData); sentry.captureException(err, { // "extra" key is required by Sentry extra: { vaultStructure }, }); }); // migrate data versionedData = await migrator.migrateData(versionedData); if (!versionedData) { throw new Error('MetaMask - migrator returned undefined'); } // this initializes the meta/version data as a class variable to be used for future writes localStore.setMetadata(versionedData.meta); // write to disk localStore.set(versionedData.data); // return just the data return versionedData.data; } function generateConnectionId(remotePort, detectedProcessName) { const { sender } = remotePort; const id = sender?.tab ? sender.tab.id : sender?.id; if (!id || !detectedProcessName) { console.error( 'Must provide id and detectedProcessName to generate connection id.', id, detectedProcessName, ); // eslint-disable-line no-console throw new Error( 'Must provide id and detectedProcessName to generate connection id.', ); } return `${id}-${detectedProcessName}`; } /** * Initializes the MetaMask Controller with any initial state and default language. * Configures platform-specific error reporting strategy. * Streams emitted state updates to platform-specific storage strategy. * Creates platform listeners for new Dapps/Contexts, and sets up their data connections to the controller. * * @param {object} initState - The initial state to start the controller with, matches the state that is emitted from the controller. * @param {string} initLangCode - The region code for the language preferred by the current user. * @param {object} overrides - object with callbacks that are allowed to override the setup controller logic (usefull for desktop app) * @param isFirstMetaMaskControllerSetup */ export function setupController( initState, initLangCode, overrides, isFirstMetaMaskControllerSetup, ) { // // MetaMask Controller // controller = new MetamaskController({ infuraProjectId: process.env.INFURA_PROJECT_ID, // User confirmation callbacks: showUserConfirmation: triggerUi, // initial state initState, // initial locale code initLangCode, // platform specific api platform, notificationManager, browser, getRequestAccountTabIds: () => { return requestAccountTabIds; }, getOpenMetamaskTabsIds: () => { return openMetamaskTabsIDs; }, localStore, overrides, isFirstMetaMaskControllerSetup, }); setupEnsIpfsResolver({ getCurrentChainId: () => controller.networkController.store.getState().providerConfig.chainId, getIpfsGateway: controller.preferencesController.getIpfsGateway.bind( controller.preferencesController, ), provider: controller.provider, }); // setup state persistence pump( storeAsStream(controller.store), debounce(1000), createStreamSink(async (state) => { await localStore.set(state); statePersistenceEvents.emit('state-persisted', state); }), (error) => { log.error('MetaMask - Persistence pipeline failed', error); }, ); setupSentryGetStateGlobal(controller); const isClientOpenStatus = () => { return ( popupIsOpen || Boolean(Object.keys(openMetamaskTabsIDs).length) || notificationIsOpen ); }; const onCloseEnvironmentInstances = (isClientOpen, environmentType) => { // if all instances of metamask are closed we call a method on the controller to stop gasFeeController polling if (isClientOpen === false) { controller.onClientClosed(); // otherwise we want to only remove the polling tokens for the environment type that has closed } else { // in the case of fullscreen environment a user might have multiple tabs open so we don't want to disconnect all of // its corresponding polling tokens unless all tabs are closed. if ( environmentType === ENVIRONMENT_TYPE_FULLSCREEN && Boolean(Object.keys(openMetamaskTabsIDs).length) ) { return; } controller.onEnvironmentTypeClosed(environmentType); } }; /** * A runtime.Port object, as provided by the browser: * * @see https://developer.mozilla.org/en-US/Add-ons/WebExtensions/API/runtime/Port * @typedef Port * @type Object */ /** * Connects a Port to the MetaMask controller via a multiplexed duplex stream. * This method identifies trusted (MetaMask) interfaces, and connects them differently from untrusted (web pages). * * @param {Port} remotePort - The port provided by a new context. */ connectRemote = async (remotePort) => { ///: BEGIN:ONLY_INCLUDE_IN(desktop) if ( DesktopManager.isDesktopEnabled() && OVERRIDE_ORIGIN.DESKTOP !== overrides?.getOrigin?.() ) { DesktopManager.createStream(remotePort, CONNECTION_TYPE_INTERNAL).then( () => { // When in Desktop Mode the responsibility to send CONNECTION_READY is on the desktop app side if (isManifestV3) { // Message below if captured by UI code in app/scripts/ui.js which will trigger UI initialisation // This ensures that UI is initialised only after background is ready // It fixes the issue of blank screen coming when extension is loaded, the issue is very frequent in MV3 remotePort.postMessage({ name: 'CONNECTION_READY' }); } }, ); return; } ///: END:ONLY_INCLUDE_IN const processName = remotePort.name; if (metamaskBlockedPorts.includes(remotePort.name)) { return; } let isMetaMaskInternalProcess = false; const sourcePlatform = getPlatform(); const senderUrl = remotePort.sender?.url ? new URL(remotePort.sender.url) : null; if (sourcePlatform === PLATFORM_FIREFOX) { isMetaMaskInternalProcess = metamaskInternalProcessHash[processName]; } else { isMetaMaskInternalProcess = senderUrl?.origin === `chrome-extension://${browser.runtime.id}`; } if (isMetaMaskInternalProcess) { const portStream = overrides?.getPortStream?.(remotePort) || new PortStream(remotePort); // communication with popup controller.isClientOpen = true; controller.setupTrustedCommunication(portStream, remotePort.sender); if (isManifestV3) { // If we get a WORKER_KEEP_ALIVE message, we respond with an ACK remotePort.onMessage.addListener((message) => { if (message.name === WORKER_KEEP_ALIVE_MESSAGE) { // To test un-comment this line and wait for 1 minute. An error should be shown on MetaMask UI. remotePort.postMessage({ name: ACK_KEEP_ALIVE_MESSAGE }); controller.appStateController.setServiceWorkerLastActiveTime( Date.now(), ); } }); } const connectionId = generateConnectionId(remotePort, processName); if (processName === ENVIRONMENT_TYPE_POPUP) { popupIsOpen = true; endOfStream(portStream, () => { openMetamaskConnections.set(connectionId, 0); popupIsOpen = false; const isClientOpen = isClientOpenStatus(); controller.isClientOpen = isClientOpen; onCloseEnvironmentInstances(isClientOpen, ENVIRONMENT_TYPE_POPUP); }); } if (processName === ENVIRONMENT_TYPE_NOTIFICATION) { notificationIsOpen = true; endOfStream(portStream, () => { openMetamaskConnections.set(connectionId, 0); notificationIsOpen = false; const isClientOpen = isClientOpenStatus(); controller.isClientOpen = isClientOpen; onCloseEnvironmentInstances( isClientOpen, ENVIRONMENT_TYPE_NOTIFICATION, ); }); } if (processName === ENVIRONMENT_TYPE_FULLSCREEN) { const tabId = remotePort.sender.tab.id; openMetamaskTabsIDs[tabId] = true; endOfStream(portStream, () => { openMetamaskConnections.set(connectionId, 0); delete openMetamaskTabsIDs[tabId]; const isClientOpen = isClientOpenStatus(); controller.isClientOpen = isClientOpen; onCloseEnvironmentInstances( isClientOpen, ENVIRONMENT_TYPE_FULLSCREEN, ); }); } } else if ( senderUrl && senderUrl.origin === phishingPageUrl.origin && senderUrl.pathname === phishingPageUrl.pathname ) { const portStream = overrides?.getPortStream?.(remotePort) || new PortStream(remotePort); controller.setupPhishingCommunication({ connectionStream: portStream, }); } else { if (remotePort.sender && remotePort.sender.tab && remotePort.sender.url) { const tabId = remotePort.sender.tab.id; const url = new URL(remotePort.sender.url); const { origin } = url; remotePort.onMessage.addListener((msg) => { if (msg.data && msg.data.method === 'eth_requestAccounts') { requestAccountTabIds[origin] = tabId; } }); } connectExternal(remotePort); } }; // communication with page or other extension connectExternal = (remotePort) => { ///: BEGIN:ONLY_INCLUDE_IN(desktop) if ( DesktopManager.isDesktopEnabled() && OVERRIDE_ORIGIN.DESKTOP !== overrides?.getOrigin?.() ) { DesktopManager.createStream(remotePort, CONNECTION_TYPE_EXTERNAL); return; } ///: END:ONLY_INCLUDE_IN const portStream = overrides?.getPortStream?.(remotePort) || new PortStream(remotePort); controller.setupUntrustedCommunication({ connectionStream: portStream, sender: remotePort.sender, }); }; if (overrides?.registerConnectListeners) { overrides.registerConnectListeners(connectRemote, connectExternal); } // // User Interface setup // updateBadge(); controller.txController.on( METAMASK_CONTROLLER_EVENTS.UPDATE_BADGE, updateBadge, ); controller.decryptMessageController.hub.on( METAMASK_CONTROLLER_EVENTS.UPDATE_BADGE, updateBadge, ); controller.encryptionPublicKeyController.hub.on( METAMASK_CONTROLLER_EVENTS.UPDATE_BADGE, updateBadge, ); controller.signController.hub.on( METAMASK_CONTROLLER_EVENTS.UPDATE_BADGE, updateBadge, ); controller.appStateController.on( METAMASK_CONTROLLER_EVENTS.UPDATE_BADGE, updateBadge, ); controller.controllerMessenger.subscribe( METAMASK_CONTROLLER_EVENTS.APPROVAL_STATE_CHANGE, updateBadge, ); /** * Updates the Web Extension's "badge" number, on the little fox in the toolbar. * The number reflects the current number of pending transactions or message signatures needing user approval. */ function updateBadge() { let label = ''; const count = getUnapprovedTransactionCount(); if (count) { label = String(count); } // browserAction has been replaced by action in MV3 if (isManifestV3) { browser.action.setBadgeText({ text: label }); browser.action.setBadgeBackgroundColor({ color: '#037DD6' }); } else { browser.browserAction.setBadgeText({ text: label }); browser.browserAction.setBadgeBackgroundColor({ color: '#037DD6' }); } } function getUnapprovedTransactionCount() { const pendingApprovalCount = controller.approvalController.getTotalApprovalCount(); const waitingForUnlockCount = controller.appStateController.waitingForUnlock.length; return pendingApprovalCount + waitingForUnlockCount; } notificationManager.on( NOTIFICATION_MANAGER_EVENTS.POPUP_CLOSED, ({ automaticallyClosed }) => { if (!automaticallyClosed) { rejectUnapprovedNotifications(); } else if (getUnapprovedTransactionCount() > 0) { triggerUi(); } }, ); function rejectUnapprovedNotifications() { Object.keys( controller.txController.txStateManager.getUnapprovedTxList(), ).forEach((txId) => controller.txController.txStateManager.setTxStatusRejected(txId), ); controller.signController.rejectUnapproved(REJECT_NOTIFICATION_CLOSE_SIG); controller.decryptMessageController.rejectUnapproved( REJECT_NOTIFICATION_CLOSE, ); controller.encryptionPublicKeyController.rejectUnapproved( REJECT_NOTIFICATION_CLOSE, ); // Finally, resolve snap dialog approvals on Flask and reject all the others managed by the ApprovalController. Object.values(controller.approvalController.state.pendingApprovals).forEach( ({ id, type }) => { switch (type) { ///: BEGIN:ONLY_INCLUDE_IN(snaps) case MESSAGE_TYPE.SNAP_DIALOG_ALERT: case MESSAGE_TYPE.SNAP_DIALOG_PROMPT: controller.approvalController.accept(id, null); break; case MESSAGE_TYPE.SNAP_DIALOG_CONFIRMATION: controller.approvalController.accept(id, false); break; ///: END:ONLY_INCLUDE_IN default: controller.approvalController.reject( id, ethErrors.provider.userRejectedRequest(), ); break; } }, ); updateBadge(); } ///: BEGIN:ONLY_INCLUDE_IN(desktop) if (OVERRIDE_ORIGIN.DESKTOP !== overrides?.getOrigin?.()) { controller.store.subscribe((state) => { DesktopManager.setState(state); }); } ///: END:ONLY_INCLUDE_IN } // // Etc... // /** * Opens the browser popup for user confirmation */ async function triggerUi() { const tabs = await platform.getActiveTabs(); const currentlyActiveMetamaskTab = Boolean( tabs.find((tab) => openMetamaskTabsIDs[tab.id]), ); // Vivaldi is not closing port connection on popup close, so popupIsOpen does not work correctly // To be reviewed in the future if this behaviour is fixed - also the way we determine isVivaldi variable might change at some point const isVivaldi = tabs.length > 0 && tabs[0].extData && tabs[0].extData.indexOf('vivaldi_tab') > -1; if ( !uiIsTriggering && (isVivaldi || !popupIsOpen) && !currentlyActiveMetamaskTab ) { uiIsTriggering = true; try { const currentPopupId = controller.appStateController.getCurrentPopupId(); await notificationManager.showPopup( (newPopupId) => controller.appStateController.setCurrentPopupId(newPopupId), currentPopupId, ); } finally { uiIsTriggering = false; } } } // It adds the "App Installed" event into a queue of events, which will be tracked only after a user opts into metrics. const addAppInstalledEvent = () => { if (controller) { controller.metaMetricsController.updateTraits({ [MetaMetricsUserTrait.InstallDateExt]: new Date() .toISOString() .split('T')[0], // yyyy-mm-dd }); controller.metaMetricsController.addEventBeforeMetricsOptIn({ category: MetaMetricsEventCategory.App, event: MetaMetricsEventName.AppInstalled, properties: {}, }); return; } setTimeout(() => { // If the controller is not set yet, we wait and try to add the "App Installed" event again. addAppInstalledEvent(); }, 1000); }; // On first install, open a new tab with MetaMask browser.runtime.onInstalled.addListener(({ reason }) => { if ( reason === 'install' && !(process.env.METAMASK_DEBUG || process.env.IN_TEST) ) { addAppInstalledEvent(); platform.openExtensionInBrowser(); } }); function setupSentryGetStateGlobal(store) { global.stateHooks.getSentryState = function () { const fullState = store.getState(); const debugState = maskObject({ metamask: fullState }, SENTRY_STATE); return { browser: window.navigator.userAgent, store: debugState, version: platform.getVersion(), }; }; } function initBackground() { initialize().catch(log.error); } if (!process.env.SKIP_BACKGROUND_INITIALIZATION) { initBackground(); }