UNPKG

@quasar/app

Version:

Quasar Framework local CLI

198 lines (161 loc) 5.75 kB
const fs = require('fs') const et = require('elementtree') const appPaths = require('../app-paths') const { log, warn } = require('../helpers/logger') const ensureConsistency = require('./ensure-consistency') const filePath = appPaths.resolve.cordova('config.xml') function setFields (root, cfg) { Object.keys(cfg).forEach(key => { const el = root.find(key) const values = cfg[key] const isObject = Object(values) === values if (!el) { if (isObject) { et.SubElement(root, key, values) } else { let entry = et.SubElement(root, key) entry.text = values } } else { if (isObject) { Object.keys(values).forEach(key => { el.set(key, values[key]) }) } else { el.text = values } } }) } class CordovaConfig { prepare (cfg) { ensureConsistency() const doc = et.parse(fs.readFileSync(filePath, 'utf-8')) this.pkg = require(appPaths.resolve.app('package.json')) this.APP_URL = cfg.build.APP_URL this.tamperedFiles = [] const root = doc.getroot() root.set('version', cfg.cordova.version || this.pkg.version) if (cfg.cordova.androidVersionCode) { root.set('android-versionCode', cfg.cordova.androidVersionCode) } setFields(root, { content: { src: this.APP_URL }, description: cfg.cordova.description || this.pkg.description }) if (this.APP_URL !== 'index.html' && !root.find(`allow-navigation[@href='${this.APP_URL}']`)) { et.SubElement(root, 'allow-navigation', { href: this.APP_URL }) if (cfg.devServer.https && cfg.ctx.targetName === 'ios') { const node = root.find('name') if (node) { this.__prepareAppDelegate(node) this.__prepareWkWebEngine(node) } } } // needed for QResizeObserver until ResizeObserver Web API is supported by all platforms if (!root.find(`allow-navigation[@href='about:*']`)) { et.SubElement(root, 'allow-navigation', { href: 'about:*' }) } this.__save(doc) } reset () { if (!this.APP_URL || this.APP_URL === 'index.html') { return } const doc = et.parse(fs.readFileSync(filePath, 'utf-8')) const root = doc.getroot() root.find('content').set('src', 'index.html') const nav = root.find(`allow-navigation[@href='${this.APP_URL}']`) if (nav) { root.remove(nav) } this.tamperedFiles.forEach(file => { file.content = file.originalContent }) this.__save(doc) this.tamperedFiles = [] } __save (doc) { const content = doc.write({ indent: 4 }) fs.writeFileSync(filePath, content, 'utf8') log('Updated Cordova config.xml') this.tamperedFiles.forEach(file => { fs.writeFileSync(file.path, file.content, 'utf8') log(`Updated ${file.name}`) }) } __prepareAppDelegate (node) { const appDelegatePath = appPaths.resolve.cordova( `platforms/ios/${node.text}/Classes/AppDelegate.m` ) if (!fs.existsSync(appDelegatePath)) { warn() warn() warn() warn() warn(`AppDelegate.m not found. Your App will revoke the devserver's SSL certificate.`) warn(`Please report the cordova CLI version and cordova-ios package that you are using.`) warn(`Also, disable HTTPS from quasar.conf.js > devServer > https`) warn() warn() warn() warn() } else { const tamperedFile = { name: 'AppDelegate.m', path: appDelegatePath } tamperedFile.originalContent = fs.readFileSync(appDelegatePath, 'utf-8') // required for allowing devserver's SSL certificate on iOS if (tamperedFile.originalContent.indexOf('allowsAnyHTTPSCertificateForHost') === -1) { tamperedFile.content = tamperedFile.originalContent + ` @implementation NSURLRequest(DataController) + (BOOL)allowsAnyHTTPSCertificateForHost:(NSString *)host { return YES; } @end ` this.tamperedFiles.push(tamperedFile) } } } __prepareWkWebEngine (node) { [ 'cordova-plugin-ionic-webview', 'cordova-plugin-wkwebview-engine' ].forEach(plugin => { const wkWebViewEnginePath = appPaths.resolve.cordova( `platforms/ios/${node.text}/Plugins/${plugin}/CDVWKWebViewEngine.m` ) if (fs.existsSync(wkWebViewEnginePath)) { const tamperedFile = { name: `${plugin} > CDVWKWebViewEngine.m`, path: wkWebViewEnginePath } tamperedFile.originalContent = fs.readFileSync(wkWebViewEnginePath, 'utf-8') // Credit: https://gist.github.com/PeterStegnar/63cb8c9a39a13265c3a855e24a33ca37#file-cdvwkwebviewengine-m-L68-L74 // Enables untrusted SSL connection if (tamperedFile.originalContent.indexOf('SecTrustRef serverTrust = challenge.protectionSpace.serverTrust') === -1) { const lookupString = '@implementation CDVWKWebViewEngine' const insertIndex = tamperedFile.originalContent.indexOf(lookupString) + lookupString.length tamperedFile.content = tamperedFile.originalContent.substring(0, insertIndex) + ` - (void)webView:(WKWebView *)webView didReceiveAuthenticationChallenge:(NSURLAuthenticationChallenge *)challenge completionHandler:(void (^)(NSURLSessionAuthChallengeDisposition disposition, NSURLCredential *credential))completionHandler { SecTrustRef serverTrust = challenge.protectionSpace.serverTrust; completionHandler(NSURLSessionAuthChallengeUseCredential, [NSURLCredential credentialForTrust:serverTrust]); } ` + tamperedFile.originalContent.substring(insertIndex) this.tamperedFiles.push(tamperedFile) } } }) } } module.exports = CordovaConfig