Code Monkey home page Code Monkey logo

metamask / metamask-extension Goto Github PK

View Code? Open in Web Editor NEW
11.5K 549.0 4.7K 491.12 MB

:globe_with_meridians: :electric_plug: The MetaMask browser extension enables browsing Ethereum blockchain enabled websites

Home Page: https://metamask.io

License: Other

JavaScript 67.97% HTML 0.07% Shell 0.28% Awk 0.01% SCSS 3.33% CSS 0.01% TypeScript 28.10% MDX 0.20% Dockerfile 0.01% EJS 0.04%
chrome extension ethereum firefox dapp dapp-developers opera brave edge

metamask-extension's Introduction

MetaMask Browser Extension

You can find the latest version of MetaMask on our official website. For help using MetaMask, visit our User Support Site.

For general questions, feature requests, or developer questions, visit our Community Forum.

MetaMask supports Firefox, Google Chrome, and Chromium-based browsers. We recommend using the latest available browser version.

For up to the minute news, follow our Twitter or Medium pages.

To learn how to develop MetaMask-compatible applications, visit our Developer Docs.

To learn how to contribute to the MetaMask project itself, visit our Internal Docs.

GitHub Codespaces quickstart

As an alternative to building on your local machine, there is a new option to get a development environment up and running in less than 5 minutes by using GitHub Codespaces. Please note that there is a Limited Free Monthly Quota, and after that GitHub will start charging you.

Note: You are billed for both time spent running, and for storage used

Open in GitHub Codespaces

  1. Start by clicking the button above
  2. A new browser tab will open with a remote version of Visual Studio Code (this will take a few minutes to load)
  3. A "Simple Browser" will open inside the browser with noVNC -- click Connect
    • Optional steps:
      • Click the button at the upper-right of the Simple Browser tab to open the noVNC window in its own tab
      • Open the noVNC sidebar on the left, click the gear icon, change the Scaling Mode to Remote Resizing
  4. Wait about 20 extra seconds on the first launch, for the scripts to finish
  5. Right-click on the noVNC desktop to launch Chrome or Firefox with MetaMask pre-installed
  6. Change some code, then run yarn start to build in dev mode
  7. After a minute or two, it will finish building, and you can see your changes in the noVNC desktop

Tips to keep your Codespaces usage lower

  • You are billed for both time spent running, and for storage used
  • Codespaces pause after 30 minutes of inactivity, and auto-delete after 30 days of inactivity
  • You can manage your Codespaces here: https://github.com/codespaces
    • You may want to manually pause them before the 30 minute timeout
    • If you have several idle Codespaces hanging around for several days, you can quickly run out of storage quota. You should delete the ones you do not plan to use anymore, and probably keep only 1 or 2 in the long-term. It's also possible to re-use old Codespaces and switch the branch, instead of creating new ones and deleting the old ones.

Codespaces on a fork

If you are not a MetaMask Internal Developer, or are otherwise developing on a fork, the default Infura key will be on the Free Plan and have very limited requests per second. If you want to use your own Infura key, follow the .metamaskrc and INFURA_PROJECT_ID instructions in the section Building on your local machine.

Building on your local machine

  • Install Node.js version 20

    • If you are using nvm (recommended) running nvm use will automatically choose the right node version for you.
  • Enable Corepack by executing the command corepack enable within the metamask-extension project. Corepack is a utility included with Node.js by default. It manages Yarn on a per-project basis, using the version specified by the packageManager property in the project's package.json file. Please note that modern releases of Yarn are not intended to be installed globally or via npm.

  • Duplicate .metamaskrc.dist within the root and rename it to .metamaskrc by running cp .metamaskrc{.dist,}.

  • Run yarn install to install the dependencies.

  • Build the project to the ./dist/ folder with yarn dist.

    • Optionally, you may run yarn start to run dev mode.
    • Uncompressed builds can be found in /dist, compressed builds can be found in /builds once they're built.
    • See the build system readme for build system usage information.
  • Follow these instructions to verify that your local build runs correctly:

Git Hooks

To get quick feedback from our shared code quality fitness functions before committing the code, you can install our git hooks with Husky.

$ yarn githooks:install

You can read more about them in our testing documentation.

If you are using VS Code and are unable to make commits from the source control sidebar due to a "command not found" error, try these steps from the Husky docs.

Contributing

Development builds

To start a development build (e.g. with logging and file watching) run yarn start.

React and Redux DevTools

To start the React DevTools, run yarn devtools:react with a development build installed in a browser. This will open in a separate window; no browser extension is required.

To start the Redux DevTools Extension:

  • Install the package remotedev-server globally (e.g. yarn global add remotedev-server)
  • Install the Redux Devtools extension.
  • Open the Redux DevTools extension and check the "Use custom (local) server" checkbox in the Remote DevTools Settings, using the default server configuration (host localhost, port 8000, secure connection checkbox unchecked).

Then run the command yarn devtools:redux with a development build installed in a browser. This will enable you to use the Redux DevTools extension to inspect MetaMask.

To create a development build and run both of these tools simultaneously, run yarn start:dev.

Test Dapp

This test site can be used to execute different user flows.

Running Unit Tests and Linting

Run unit tests and the linter with yarn test. To run just unit tests, run yarn test:unit.

You can run the linter by itself with yarn lint, and you can automatically fix some lint problems with yarn lint:fix. You can also run these two commands just on your local changes to save time with yarn lint:changed and yarn lint:changed:fix respectively.

For Jest debugging guide using Node.js, see docs/tests/jest.md.

Running E2E Tests

Our e2e test suite can be run on either Firefox or Chrome. Here's how to get started with e2e testing:

Preparing a Test Build

Before running e2e tests, ensure you've run yarn install to download dependencies. Next, you'll need a test build. You have 3 options:

  1. Use yarn download-builds:test to quickly download and unzip test builds for Chrome and Firefox into the ./dist/ folder. This method is fast and convenient for standard testing.
  2. Create a custom test build: for testing against different build types, use yarn build:test. This command allows you to generate test builds for various types, including:
    • yarn build:test for main build
    • yarn build:test:flask for flask build
    • yarn build:test:mmi for mmi build
    • yarn build:test:mv3 for mv3 build
  3. Start a test build with live changes: yarn start:test is particularly useful for development. It starts a test build that automatically recompiles application code upon changes. This option is ideal for iterative testing and development. This command also allows you to generate test builds for various types, including:
    • yarn start:test for main build
    • yarn start:test:flask for flask build
    • yarn start:test:mv3 for mv3 build

Note: The yarn start:test command (which initiates the testDev build type) has LavaMoat disabled for both the build system and the application, offering a streamlined testing experience during development. On the other hand, yarn build:test enables LavaMoat for enhanced security in both the build system and application, mirroring production environments more closely.

Running Tests

Once you have your test build ready, choose the browser for your e2e tests:

  • For Firefox, run yarn test:e2e:firefox.
  • For Chrome, run yarn test:e2e:chrome.

These scripts support additional options for debugging. Use --helpto see all available options.

Running a single e2e test

Single e2e tests can be run with yarn test:e2e:single test/e2e/tests/TEST_NAME.spec.js along with the options below.

  --browser           Set the browser to be used; specify 'chrome', 'firefox', 'all'
                      or leave unset to run on 'all' by default.
                                                          [string] [default: 'all']
  --debug             Run tests in debug mode, logging each driver interaction
                                                         [boolean] [default: true]
  --retries           Set how many times the test should be retried upon failure.
                                                              [number] [default: 0]
  --leave-running     Leaves the browser running after a test fails, along with
                      anything else that the test used (ganache, the test dapp,
                      etc.)                              [boolean] [default: false]
  --update-snapshot   Update E2E test snapshots
                                             [alias: -u] [boolean] [default: false]

For example, to run the account-details tests using Chrome, with debug logging and with the browser set to remain open upon failure, you would use: yarn test:e2e:single test/e2e/tests/account-menu/account-details.spec.js --browser=chrome --leave-running

Running e2e tests against specific feature flag

While developing new features, we often use feature flags. As we prepare to make these features generally available (GA), we remove the feature flags. Existing feature flags are listed in the .metamaskrc.dist file. To execute e2e tests with a particular feature flag enabled, it's necessary to first generate a test build with that feature flag activated. There are two ways to achieve this:

  • To enable a feature flag in your local configuration, you should first ensure you have a .metamaskrc file copied from .metamaskrc.dist. Then, within your local .metamaskrc file, you can set the desired feature flag to true. Following this, a test build with the feature flag enabled can be created by executing yarn build:test.

  • Alternatively, for enabling a feature flag directly during the test build creation, you can pass the parameter as true via the command line. For instance, activating the MULTICHAIN feature flag can be done by running MULTICHAIN=1 yarn build:test or MULTICHAIN=1 yarn start:test . This method allows for quick adjustments to feature flags without altering the .metamaskrc file.

Once you've created a test build with the desired feature flag enabled, proceed to run your tests as usual. Your tests will now run against the version of the extension with the specific feature flag activated. For example: yarn test:e2e:single test/e2e/tests/account-menu/account-details.spec.js --browser=chrome

This approach ensures that your e2e tests accurately reflect the user experience for the upcoming GA features.

Running specific builds types e2e test

Different build types have different e2e tests sets. In order to run them look in the package.json file. You will find:

    "test:e2e:chrome:mmi": "SELENIUM_BROWSER=chrome node test/e2e/run-all.js --mmi",
    "test:e2e:chrome:snaps": "SELENIUM_BROWSER=chrome node test/e2e/run-all.js --snaps",
    "test:e2e:chrome:mv3": "ENABLE_MV3=true SELENIUM_BROWSER=chrome node test/e2e/run-all.js",

Note: Running MMI e2e tests

When running e2e on an MMI build you need to know that there are 2 separated set of tests:

  • MMI runs a subset of MetaMask's e2e tests. To facilitate this, we have appended the @no-mmi tags to the names of those tests that are not applicable to this build type.
  • MMI runs another specific set of e2e legacy tests which are better documented here

Changing dependencies

Whenever you change dependencies (adding, removing, or updating, either in package.json or yarn.lock), there are various files that must be kept up-to-date.

  • yarn.lock:
    • Run yarn again after your changes to ensure yarn.lock has been properly updated.
    • Run yarn lint:lockfile:dedupe:fix to remove duplicate dependencies from the lockfile.
  • The allow-scripts configuration in package.json
    • Run yarn allow-scripts auto to update the allow-scripts configuration automatically. This config determines whether the package's install/postinstall scripts are allowed to run. Review each new package to determine whether the install script needs to run or not, testing if necessary.
    • Unfortunately, yarn allow-scripts auto will behave inconsistently on different platforms. macOS and Windows users may see extraneous changes relating to optional dependencies.
  • The LavaMoat policy files
    • If you are a MetaMask team member and your PR is on a repository branch, you can use the bot command @metamaskbot update-policies to ask the MetaMask bot to automatically update the policies for you.
    • If your PR is from a fork, you can ask a MetaMask team member to help with updating the policy files.
    • Manual update instructions: The tl;dr is to run yarn lavamoat:auto to update these files, but there can be devils in the details:
      • There are two sets of LavaMoat policy files:
        • The production LavaMoat policy files (lavamoat/browserify/*/policy.json), which are re-generated using yarn lavamoat:webapp:auto. Add --help for usage.
          • These should be regenerated whenever the production dependencies for the webapp change.
        • The build system LavaMoat policy file (lavamoat/build-system/policy.json), which is re-generated using yarn lavamoat:build:auto.
          • This should be regenerated whenever the dependencies used by the build system itself change.
      • Whenever you regenerate a policy file, review the changes to determine whether the access granted to each package seems appropriate.
      • Unfortunately, yarn lavamoat:auto will behave inconsistently on different platforms. macOS and Windows users may see extraneous changes relating to optional dependencies.
      • If you keep getting policy failures even after regenerating the policy files, try regenerating the policies after a clean install by doing:
        • rm -rf node_modules/ && yarn && yarn lavamoat:auto
      • Keep in mind that any kind of dynamic import or dynamic use of globals may elude LavaMoat's static analysis. Refer to the LavaMoat documentation or ask for help if you run into any issues.

Architecture

Architecture Diagram

Other Docs

Dapp Developer Resources

metamask-extension's People

Contributors

2-am-zzz avatar adonesky1 avatar alextsg avatar brad-decker avatar brunobar79 avatar chikeichan avatar dan437 avatar danfinlay avatar danjm avatar darkwing avatar digiwand avatar estebanmino avatar flyswatter avatar frankiebee avatar frederikbolding avatar georgewrmarshall avatar gudahtt avatar jpuri avatar kumavis avatar metamaskbot avatar nidhikjha avatar niranjanabinoy avatar peteryinusa avatar rekmarks avatar ryanml avatar sdtsui avatar seaona avatar tmashuang avatar whymarrh avatar zone-live avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

metamask-extension's Issues

Handle blockchain errors within Metamask

Currently when submitting a transaction through metamask, all errors are passed back to the dapp, and metamask just forgets the transaction like it's just done with it.

This could be a network error, or an insufficient funds error, or some other kind of error that I don't even know about. Many of these could be anticipated and handled well within the Metamask context, without forcing every dapp UI to render these errors appropriately.

We'll need to do a survey of all the types of errors we could get, and maybe figure out how we want to deal with them individually

We might even want to add a button like "pass error to Dapp" to allow the user to override our own error interception.

This might make a nice public beta feature or earlier, since it directly affects dapp developers, and the ways they need to handle & render errors, but I'll leave the milestone to you @kumavis

Add info to help page

We have a ? button in the corner but it goes nowhere.

It should go to a help page that includes

  • join slack
  • public github issues
  • email

Where do we want to keep public github issues, @kumavis?

Log Rolling

Need to have scalable logging solution - throw away or archive

@caktux had some tips

Things Remaining To Do

High Level

  • Making Dapps work in Chrome
    • Key pair management (generic identity management)
      • Basically done already by lightwallet
      • Includes UI component
    • Ethereum Client
      Most of the problem (>=80%)
    • web3 injected from Chrome extension
      Fairly trivial
  • Launch Prep

Ethereum Frontend JS Client

A light-client that doesn't need to climb the merkle tree, just trusts its provider. Maybe later on we'll move to a lite-client, but those aren't ready yet.

  • Provider engine (Caching layer, mostly done)
    • Provider engine should handle forks:
      • Requires responding to fork announcements on the protocol and cleaning up the cache appropriately.
      • Will need to recognize when a block is broadcast with the same # as another block, verify authenticity (same parent).
      • Need to replace "what is the newest block" with "what is the next block after X", to avoid skipped blocks
  • In theory, this could maybe be replaced by some kind of webRTC light-client.
  • Add toggle between test & main blockchains.

Backend

  • Need to have scalable logging solution.
    • Some recommendations: @ketux had some tips
  • Fix occasional dropped connections from caching/whitelist server in front of the RPC.
    • Called eth-rpc-wrapper. Uses node/express
  • Finish eth-rpc-wrapper
    • Filters out some types of requests, like sleep node, that we shouldn't allow.
  • Provide methods the RPC does not provide
    • Mapping from account to transaction history
      • Provided from etherscan for the time being, but we might want to implement ourselves.
  • Set HTTPS via probably LetsEncrypt for automatic SSL renewal etc.

Frontend Interface

  • Allow creating new accounts
  • Allow exporting accounts
  • Allow importing accounts
  • Allow deleting accounts
  • Allow nicknaming accounts
  • Integrate uPort account flavoring
  • Add per-domain configuration
    • Allow selecting what accounts the current dApp can see.
  • Add friendly first-time user experience flow
  • Dapp store integration

Launch Preperation

  • Add nice intro to main page
  • Compose email to blast out to email list
  • Compose reddit post
  • Compose Medium post
    • Look into using Consensys's Medium account
  • Compose HackerNews post
  • Pretty up the home page
  • Create chrome app store page
    • Screenshots
    • Description
  • Create list of dApps that work with Metamask at launch
  • Create simple dApp for Metamask tutorial
  • Create software licenses for all components

Add descriptions of why the permissions are so extreme in chrome store description

This plugin requires about as scary-sounding permissions as a chrome extension can ask for, and that is almost definitely going to repulse some users.

What we can do to mitigate that effect is to document and be as transparent as possible about why we require those permissions.

The app store description is one place, I'm not sure if Chrome lets you explain on the permissions screen itself, but we should basically PR bomb why we require permissions as much as possible, so users are prepared for that authorization request.

WEBGL dies on ubuntu

popup.js:44829 THREE.WebGLRenderer 73
popup.js:45004 THREE.WebGLRenderer: Error creating WebGL context.THREE.WebGLRenderer @ popup.js:45004
extensions::uncaught_exception_handler:8 Error in event handler for (unknown): TypeError: Cannot read property 'getExtension' of null
   at get (chrome-extension://nkbihfbeogaeaoehlefnkodbefgpgknn/scripts/popup.js:48807:19)
   at new THREE.WebGLRenderer (chrome-extension://nkbihfbeogaeaoehlefnkodbefgpgknn/scripts/popup.js:45010:13)
   at module.exports (chrome-extension://nkbihfbeogaeaoehlefnkodbefgpgknn/scripts/popup.js:22604:18)
   at new Mascot (chrome-extension://nkbihfbeogaeaoehlefnkodbefgpgknn/scripts/popup.js:60274:15)
   at ReactCompositeComponentMixin.mountComponent (chrome-extension://nkbihfbeogaeaoehlefnkodbefgpgknn/scripts/popup.js:78904:18)
   at wrapper [as mountComponent] (chrome-extension://nkbihfbeogaeaoehlefnkodbefgpgknn/scripts/popup.js:85790:21)
   at Object.ReactReconciler.mountComponent (chrome-extension://nkbihfbeogaeaoehlefnkodbefgpgknn/scripts/popup.js:86418:35)
   at ReactDOMComponent.ReactMultiChild.Mixin.mountChildren (chrome-extension://nkbihfbeogaeaoehlefnkodbefgpgknn/scripts/popup.js:85121:44)
   at ReactDOMComponent.Mixin._createContentMarkup (chrome-extension://nkbihfbeogaeaoehlefnkodbefgpgknn/scripts/popup.js:80221:32)
   at ReactDOMComponent.Mixin.mountComponent (chrome-extension://nkbihfbeogaeaoehlefnkodbefgpgknn/scripts/popup.js:80109:29)

Unify input styles

Currently vault creation input style is different from password input style, and rpc selecting input isn't quite the same either.

Updated home page

This isn't the full public spiff for the public launch, just updated resources and info for the public beta.

Get scalable test-net RPC in place

Requirements:

  • A flexible number of RPC nodes
  • A load balancer in front of them
  • The load balancer needs to filter out some types of requests that can DDOS a node (@kumavis to expand).

This might be a good task for hiring out to a devops person, it's pretty generic system configuration stuff.

Add auto-logout timer and warning

Probably as a configurable option, a logout timer is a nice added security for when people forget to lock their vault themselves.

Persist transactions between reload

Currently if a dapp initiates a transaction, and the user gets confused, they might reload the dapp, which currently would wipe the pending transaction to sign.

We should persist these transactions, and keep them managed in some kind of transactions view, where a user can view pending, signed, and completed transactions.

Submitted by Nick Dodson.

Time-limit retry attempts

At least for the public launch, we should have a background-enforced time-limiting on password retries, to reduce plausibility of brute forcing a metamask vault. Maybe the retry interval should increase logarithmically, too.

Provide button to enter password/other text fields

Requested by @simondlr.

Just to reiterate, I’d still suggest having buttons as default behaviour for accepting passwords, with “enter” being optional. Not sure if this is on the roadmaps. Additionally, if password is typed wrongly, it should ideally return some information of what happened.

Keep Additional Indexes

Provide methods the RPC does not provide
Mapping from account to tx sent
Mapping from account to tx that triggered message received

Some may be provided from etherscan or blockapps for the time being, but we might want to implement ourselves.

Smoother TX Approval Process

Right now after approving a TX, it just shows you an empty tx screen. It should at least transition back to the account list to imply it was completed.

Pop-Over Tx Approval UX

Probably will be a new tab, since Chrome won't allow the extension to programmatically pop-up.

Approving should return to the Dapp.

Will make it immediately clear when a Transaction is requesting approval, instead of the small number on the extension icon we have now.

Modules were missing.

readable-stream

Error: Cannot find module 'readable-stream' from '/Users/simondlr/code/ethereum/metamask-plugin/app/scripts/lib'

xtend

Error: Cannot find module 'xtend' from '/Users/simondlr/code/ethereum/metamask-plugin/node_modules/web3-provider-engine/util'

I assume readable stream needs to be added at the plugin level & xtend needs to be added at the provider package.json?

Resolve Backend Issues

Not sure if this belongs in private or public beta, it seems like you're starting on this with urgency, @kumavis, so I'm putting it earlier.

  • Need to have scalable logging solution.
    • Some recommendations: @caktux had some tips
  • Fix occasional dropped connections from caching/whitelist server in front of the RPC.
    • Called eth-rpc-wrapper. Uses node/express
  • Finish eth-rpc-wrapper
    • Filters out some types of requests, like sleep node, that we shouldn't allow.
  • Provide methods the RPC does not provide
    • Mapping from account to transaction history
      • Provided from etherscan for the time being, but we might want to implement ourselves.
  • Set HTTPS via probably LetsEncrypt for automatic SSL renewal etc.

EDIT: fixed @caktux's name -kumavis

PR Blast

Prepare PR, then blast it to:

  • Email list
  • Consensys email
  • Metamask Blog
  • Hacker News
  • Reddit
  • Tech journalists?
  • Make a proper press release and send it to various tech blogs?

Add new, smaller next milestone: Developer Invite-Only Beta

A few of the larger tasks on the current milestone involve fixing our RPC backend architecture, and making it more robust.

Considering many devs are already running their own RPC nodes, or test-RPCs, I don't think it's asking too much that they provide their own RPCs.

If we say the next milestone is to provide a minimal set of features to allow devs to experience Metamask and prepare their Dapps for compatability, we can put off those backend tasks to a later milestone, and deliver some value to our developer community sooner.

Account CRUD

Provide UI for managing accounts:

  • Reveal Additional Accounts
  • Edit account nicknames

Dapp Store Integration

Find some way to tie the Dapp Store into the Metamask experience, be it a link or some tighter integration.

Configuration should be per-domain

There are some features that are currently plugin-wide, that should actually be configurable on a site-by-site basis.

Please add examples here so we can catch them under this issue:

  • Current RPC
  • Currently visible account

Add reset nonce/refresh account button

Sometimes our account list is getting desynced with the blockchain, and so the transactions we generate have the wrong nonce.

Ideally we don't get out of sync in the first place, or we refresh on each new transaction to avoid this case.

This is a show-stopper, disrupting random transactions, so it belongs in the next release.

Was reported by Nick Dodson.

Limit web3 injection to sites that require it

Currently when enabled, Metamask injects web3 indiscriminately into all web pages that browser visits.

It would be polite if we had a mechanism to only inject on sites that require it. Do we have a strategy to identify these sites?

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.