comit-network / ambrosia

UI for trading in the COMIT network
Apache License 2.0
4 stars 3 forks source link

Electron Recovery Plan #1

Closed yosriady closed 4 years ago

yosriady commented 4 years ago

@yosriady commented on Mon May 25 2020

TODO: Fix Electron

TODO: comit-app-regen -> taker-ui


@yosriady commented on Tue Jun 09 2020

Electron Recovery Plan:

  1. First, extract a pure React app from the existing Electron app
  2. Then, generate a new Electron app with the latest libraries
  3. Include all previous fixes and pipeline modifications from old project
  4. Port the React app back in

Steps 2 and 3


@yosriady commented on Tue Jun 09 2020

Error details: https://gist.github.com/yosriady/a8313b4a7f42ff5e5c5bc3adaa98026c

echo $(brew --prefix openssl)/include
/usr/local/opt/openssl@1.1/include

https://github.com/actions/virtual-environments/issues/837

OpenSSL 1.0.2t 10 Sep 2019 (/usr/local/opt/openssl -> /usr/local/Cellar/openssl/1.0.2t)


@yosriady commented on Wed Jun 10 2020


@yosriady commented on Wed Jun 10 2020

yosriady commented 4 years ago
/Applications/TakerUI.app/Contents/Resources/app.asar/dist/renderer.prod.js:16 TypeError: Cannot read property 'insertBefore' of null
    at e.t.insert (dist/renderer.prod.js:2)
    at Tt (dist/renderer.prod.js:2)
    at Array.forEach (<anonymous>)
    at Function.Mt (dist/renderer.prod.js:2)
    at i (dist/renderer.prod.js:2)
    at l (dist/renderer.prod.js:2)
    at Object.a [as insert] (dist/renderer.prod.js:2)
    at zt (dist/renderer.prod.js:2)
    at dist/renderer.prod.js:2
    at vs (dist/renderer.prod.js:16)
yosriady commented 4 years ago

Debugging plan A:

Debugging plan B:

Debugging plan C:

Debugging plan D:

Debugging plan E:

yosriady commented 4 years ago

Using any component from chakra results in TypeError: Cannot read property 'insertBefore' of null when in production mode yarn start

yosriady commented 4 years ago

This hack / temporary fix helps but is not recommended for security reasons: https://github.com/electron-react-boilerplate/electron-react-boilerplate/issues/2395#issuecomment-593474211

This is a big security hole because it opens up the app to XSS attack if we ever use any external data https://www.electronjs.org/docs/tutorial/security#isolation-for-untrusted-content

yosriady commented 4 years ago

Optional:

yosriady commented 4 years ago

Fixed via electron-react-boilerplate/electron-react-boilerplate#2395 (comment)