From 5694f166247052ed79a12145d67d6a7b436a604b Mon Sep 17 00:00:00 2001 From: Danny Liu Date: Fri, 5 Apr 2024 21:02:02 -0700 Subject: [PATCH] style: run npm run format --- .../components/chat/Settings/Account.svelte | 9 ++++-- src/lib/utils/index.ts | 30 ++++++++++++------- src/routes/auth/+page.svelte | 4 +-- 3 files changed, 27 insertions(+), 16 deletions(-) diff --git a/src/lib/components/chat/Settings/Account.svelte b/src/lib/components/chat/Settings/Account.svelte index 136d42230..651a4ee03 100644 --- a/src/lib/components/chat/Settings/Account.svelte +++ b/src/lib/components/chat/Settings/Account.svelte @@ -151,9 +151,12 @@ if (canvasPixelTest()) { profileImageUrl = generateInitialsImage(name); } else { - toast.error("Canvas pixel test failed, fingerprint evasion likely. Disable fingerprint evasion and try again!", { - autoClose: 1000 * 10, - }); + toast.error( + 'Canvas pixel test failed, fingerprint evasion likely. Disable fingerprint evasion and try again!', + { + autoClose: 1000 * 10 + } + ); } }}>{$i18n.t('Use Gravatar')} diff --git a/src/lib/utils/index.ts b/src/lib/utils/index.ts index ee3b4a77e..77454114f 100644 --- a/src/lib/utils/index.ts +++ b/src/lib/utils/index.ts @@ -99,7 +99,7 @@ export const getGravatarURL = (email) => { export const canvasPixelTest = () => { // Test a 1x1 pixel to potentially identify browser/plugin fingerprint blocking or spoofing // Inspiration: https://github.com/kkapsner/CanvasBlocker/blob/master/test/detectionTest.js - const canvas = document.createElement("canvas"); + const canvas = document.createElement('canvas'); const ctx = canvas.getContext('2d'); canvas.height = 1; canvas.width = 1; @@ -107,11 +107,10 @@ export const canvasPixelTest = () => { const pixelValues = imageData.data; // Generate RGB test data - for (let i = 0; i < imageData.data.length; i += 1){ - if (i % 4 !== 3){ + for (let i = 0; i < imageData.data.length; i += 1) { + if (i % 4 !== 3) { pixelValues[i] = Math.floor(256 * Math.random()); - } - else { + } else { pixelValues[i] = 255; } } @@ -120,16 +119,23 @@ export const canvasPixelTest = () => { const p = ctx.getImageData(0, 0, canvas.width, canvas.height).data; // Read RGB data and fail if unmatched - for (let i = 0; i < p.length; i += 1){ - if (p[i] !== pixelValues[i]){ - console.log("canvasPixelTest: Wrong canvas pixel RGB value detected:", p[i], "at:", i, "expected:", pixelValues[i]); - console.log("canvasPixelTest: Canvas blocking or spoofing is likely"); + for (let i = 0; i < p.length; i += 1) { + if (p[i] !== pixelValues[i]) { + console.log( + 'canvasPixelTest: Wrong canvas pixel RGB value detected:', + p[i], + 'at:', + i, + 'expected:', + pixelValues[i] + ); + console.log('canvasPixelTest: Canvas blocking or spoofing is likely'); return false; } } return true; -} +}; export const generateInitialsImage = (name) => { const canvas = document.createElement('canvas'); @@ -138,7 +144,9 @@ export const generateInitialsImage = (name) => { canvas.height = 100; if (!canvasPixelTest()) { - console.log("generateInitialsImage: failed pixel test, fingerprint evasion is likely. Using default image."); + console.log( + 'generateInitialsImage: failed pixel test, fingerprint evasion is likely. Using default image.' + ); return '/user.png'; } diff --git a/src/routes/auth/+page.svelte b/src/routes/auth/+page.svelte index c7492cb26..0f2f428c8 100644 --- a/src/routes/auth/+page.svelte +++ b/src/routes/auth/+page.svelte @@ -44,8 +44,8 @@ ); if (!canvasPixelTest()) { - toast.error("Canvas pixel test failed, fingerprint evasion likely. Default image used.", { - autoClose: 1000 * 10, + toast.error('Canvas pixel test failed, fingerprint evasion likely. Default image used.', { + autoClose: 1000 * 10 }); }