mirror of
https://github.com/cake-tech/cake_wallet.git
synced 2025-06-28 04:19:50 +00:00
* tor wip * Enable tor on iOS * Prevent app lag when node is exceptionally slow (usually over tor) * fix: logic in daemonBlockchainHeight refresh fix: storing tor state * Pin ledger_flutter_plus dependency to fix builds * bump arti version * wip * add single httpclient * route everything I was able to catch trough the built-in tor node * Enable proxy for http.Client [run tests] * add tor proxy support to cw_evm, cw_tron and cw_polygon [run tests] * remove log pollution, cleanup [skip slack] * fix tests not working in latest main [skip slack] [run tests] * remove cw_wownero import * fix build issues * migrate all remaining calls to use ProxyWrapper add a CI action to enforce using ProxyWrapper instead of http/http.dart to prevent leaks * fix tor background sync (will work on test builds after #2142 is merged and this PR is rebased on top) * wip [skip ci] * relicense to GPLv3 add socks5 license, build fixes * use ProxyWrapper instead of http in robinhood * Revert "relicense to GPLv3" * feat(cw_bitcoin): support socks proxy and CakeTor * fix(tor): migrate OCP and EVM over to ProxyWrapper() * chore: cleanup fix: show tor loading screen when app is starting * fix: tor switch properly dismisses fullscreen loading dialog fix: connectToNode after tor startup on app start * fix(tor): status check for xmr/wow/zano * fix(tor): onramper request fix * fix(api): ServicesResponse is now being cached and doesn't fetch data everytime DashboardViewModel is being rebuilt fix(tor): do not fallback to clearnet when tor failed. fix(tor): do not leak connections during app startup chore: refactor bootstrap() function to be separated into bootstrapOffline and bootstrapOnline fix(cw_bitcoin): migrate payjoin to use ProxyWrapper * [skip ci] remove print * address comments from review * fix: derusting tor implementation Instead of rust-based Arti I've moved back to the OG C++ tor implementation. This fixed all issues we had with Tor. - onion services now work - all requests are going through without random errors - we don't have to navigate a maze of multiple forks of multiple packages - fully working `torrc` config file (probably will be needed for Tari). - logging for Tor client - and so on. feat: network logging tab feat: use built-in proxy on Tails - this should resolve all issues for Tails users (needs testing though) * fix conflicts with main bump https to fix build issue relax store() call * fix(cw_wownero): tor connection fix(tor): connection issues * fix(cw_evm): add missing chainId fix(cw_core): solana rpc fix * feat: mark tor as experimental fix: drop anonpay onion authority fix: drop fiatapi onion authority fix: drop trocador onion authority fix: disable networkimage when tor is enabled fix: handle cakepay errors gracefully * fix re-formatting [skip ci] * changes from review * Delete android/.kotlin/sessions/kotlin-compiler-2468481326039681181.salive * fix missing imports * Update pubspec_base.yaml --------- Co-authored-by: OmarHatem <omarh.ismail1@gmail.com>
66 lines
1.8 KiB
Dart
66 lines
1.8 KiB
Dart
import 'dart:convert';
|
|
import 'package:cw_core/utils/proxy_wrapper.dart';
|
|
import 'package:cw_core/utils/print_verbose.dart';
|
|
import 'package:cake_wallet/mastodon/mastodon_user.dart';
|
|
|
|
class MastodonAPI {
|
|
static const httpsScheme = 'https';
|
|
static const userPath = '/api/v1/accounts/lookup';
|
|
static const statusesPath = '/api/v1/accounts/:id/statuses';
|
|
|
|
static Future<MastodonUser?> lookupUserByUserName(
|
|
{required String userName, required String apiHost}) async {
|
|
try {
|
|
final queryParams = {'acct': userName};
|
|
|
|
final uri = Uri(
|
|
scheme: httpsScheme,
|
|
host: apiHost,
|
|
path: userPath,
|
|
queryParameters: queryParams,
|
|
);
|
|
|
|
final response = await ProxyWrapper().get(clearnetUri: uri);
|
|
|
|
|
|
if (response.statusCode != 200) return null;
|
|
|
|
final Map<String, dynamic> responseJSON = json.decode(response.body) as Map<String, dynamic>;
|
|
|
|
return MastodonUser.fromJson(responseJSON);
|
|
} catch (e) {
|
|
printV('Error in lookupUserByUserName: $e');
|
|
return null;
|
|
}
|
|
}
|
|
|
|
static Future<List<PinnedPost>> getPinnedPosts({
|
|
required String userId,
|
|
required String apiHost,
|
|
}) async {
|
|
try {
|
|
final queryParams = {'pinned': 'true'};
|
|
|
|
final uri = Uri(
|
|
scheme: httpsScheme,
|
|
host: apiHost,
|
|
path: statusesPath.replaceAll(':id', userId),
|
|
queryParameters: queryParams,
|
|
);
|
|
|
|
final response = await ProxyWrapper().get(clearnetUri: uri);
|
|
|
|
|
|
if (response.statusCode != 200) {
|
|
throw Exception('Unexpected HTTP status: ${response.statusCode}');
|
|
}
|
|
|
|
final List<dynamic> responseJSON = json.decode(response.body) as List<dynamic>;
|
|
|
|
return responseJSON.map((json) => PinnedPost.fromJson(json as Map<String, dynamic>)).toList();
|
|
} catch (e) {
|
|
printV('Error in getPinnedPosts: $e');
|
|
throw e;
|
|
}
|
|
}
|
|
}
|