@reown/appkit-solana-react-native 0.0.0-feat-multichain-20250604171123 → 0.0.0-feat-multichain-phantom-20250606183519
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/commonjs/connectors/PhantomConnector.js +246 -0
- package/lib/commonjs/connectors/PhantomConnector.js.map +1 -0
- package/lib/commonjs/helpers.js +9 -0
- package/lib/commonjs/helpers.js.map +1 -1
- package/lib/commonjs/index.js +7 -0
- package/lib/commonjs/index.js.map +1 -1
- package/lib/commonjs/providers/PhantomProvider.js +396 -0
- package/lib/commonjs/providers/PhantomProvider.js.map +1 -0
- package/lib/commonjs/types.js +6 -0
- package/lib/commonjs/types.js.map +1 -0
- package/lib/module/connectors/PhantomConnector.js +238 -0
- package/lib/module/connectors/PhantomConnector.js.map +1 -0
- package/lib/module/helpers.js +9 -0
- package/lib/module/helpers.js.map +1 -1
- package/lib/module/index.js +7 -2
- package/lib/module/index.js.map +1 -1
- package/lib/module/providers/PhantomProvider.js +388 -0
- package/lib/module/providers/PhantomProvider.js.map +1 -0
- package/lib/module/types.js +2 -0
- package/lib/module/types.js.map +1 -0
- package/lib/typescript/connectors/PhantomConnector.d.ts +26 -0
- package/lib/typescript/connectors/PhantomConnector.d.ts.map +1 -0
- package/lib/typescript/helpers.d.ts +8 -7
- package/lib/typescript/helpers.d.ts.map +1 -1
- package/lib/typescript/index.d.ts +3 -2
- package/lib/typescript/index.d.ts.map +1 -1
- package/lib/typescript/providers/PhantomProvider.d.ts +37 -0
- package/lib/typescript/providers/PhantomProvider.d.ts.map +1 -0
- package/lib/typescript/types.d.ts +96 -0
- package/lib/typescript/types.d.ts.map +1 -0
- package/package.json +7 -5
- package/src/connectors/PhantomConnector.ts +329 -0
- package/src/helpers.ts +9 -7
- package/src/index.ts +8 -0
- package/src/providers/PhantomProvider.ts +535 -0
- package/src/types.ts +131 -0
- package/src/index.tsx +0 -2
|
@@ -0,0 +1,396 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
|
|
3
|
+
Object.defineProperty(exports, "__esModule", {
|
|
4
|
+
value: true
|
|
5
|
+
});
|
|
6
|
+
exports.SOLANA_SIGNING_METHODS = exports.PhantomProvider = void 0;
|
|
7
|
+
var _reactNative = require("react-native");
|
|
8
|
+
var _tweetnacl = _interopRequireDefault(require("tweetnacl"));
|
|
9
|
+
var _bs = _interopRequireDefault(require("bs58"));
|
|
10
|
+
var _buffer = require("buffer");
|
|
11
|
+
var _events = _interopRequireDefault(require("events"));
|
|
12
|
+
function _interopRequireDefault(e) { return e && e.__esModule ? e : { default: e }; }
|
|
13
|
+
const PHANTOM_BASE_URL = 'https://phantom.app/ul/v1';
|
|
14
|
+
const PHANTOM_PROVIDER_STORAGE_KEY = '@appkit/phantom-provider-session';
|
|
15
|
+
const SOLANA_SIGNING_METHODS = exports.SOLANA_SIGNING_METHODS = {
|
|
16
|
+
SOLANA_SIGN_TRANSACTION: 'solana_signTransaction',
|
|
17
|
+
SOLANA_SIGN_MESSAGE: 'solana_signMessage',
|
|
18
|
+
SOLANA_SIGN_AND_SEND_TRANSACTION: 'solana_signAndSendTransaction',
|
|
19
|
+
SOLANA_SIGN_ALL_TRANSACTIONS: 'solana_signAllTransactions'
|
|
20
|
+
};
|
|
21
|
+
function isValidSolanaSigningMethod(method) {
|
|
22
|
+
return Object.values(SOLANA_SIGNING_METHODS).includes(method);
|
|
23
|
+
}
|
|
24
|
+
class PhantomProvider extends _events.default {
|
|
25
|
+
currentCluster = 'mainnet-beta';
|
|
26
|
+
sessionToken = null;
|
|
27
|
+
userPublicKey = null;
|
|
28
|
+
phantomEncryptionPublicKeyBs58 = null;
|
|
29
|
+
constructor(config) {
|
|
30
|
+
super();
|
|
31
|
+
this.config = config;
|
|
32
|
+
this.dappEncryptionKeyPair = config.dappEncryptionKeyPair;
|
|
33
|
+
this.storage = config.storage;
|
|
34
|
+
}
|
|
35
|
+
getUserPublicKey() {
|
|
36
|
+
return this.userPublicKey;
|
|
37
|
+
}
|
|
38
|
+
isConnected() {
|
|
39
|
+
return !!this.sessionToken && !!this.userPublicKey && !!this.dappEncryptionKeyPair;
|
|
40
|
+
}
|
|
41
|
+
buildUrl(rpcMethod, params) {
|
|
42
|
+
const query = new URLSearchParams(params).toString();
|
|
43
|
+
return `${PHANTOM_BASE_URL}/${rpcMethod}?${query}`;
|
|
44
|
+
}
|
|
45
|
+
getRpcMethodName(method) {
|
|
46
|
+
switch (method) {
|
|
47
|
+
case SOLANA_SIGNING_METHODS.SOLANA_SIGN_TRANSACTION:
|
|
48
|
+
return 'signTransaction';
|
|
49
|
+
case SOLANA_SIGNING_METHODS.SOLANA_SIGN_AND_SEND_TRANSACTION:
|
|
50
|
+
return 'signAndSendTransaction';
|
|
51
|
+
case SOLANA_SIGNING_METHODS.SOLANA_SIGN_ALL_TRANSACTIONS:
|
|
52
|
+
return 'signAllTransactions';
|
|
53
|
+
case SOLANA_SIGNING_METHODS.SOLANA_SIGN_MESSAGE:
|
|
54
|
+
return 'signMessage';
|
|
55
|
+
default:
|
|
56
|
+
// Should not happen due to type constraints on `method`
|
|
57
|
+
throw new Error(`Unsupported Solana signing method: ${method}`);
|
|
58
|
+
}
|
|
59
|
+
}
|
|
60
|
+
encryptPayload(payload, phantomPublicKeyBs58ToEncryptFor) {
|
|
61
|
+
if (!phantomPublicKeyBs58ToEncryptFor) {
|
|
62
|
+
return null;
|
|
63
|
+
}
|
|
64
|
+
try {
|
|
65
|
+
const phantomPublicKeyBytes = _bs.default.decode(phantomPublicKeyBs58ToEncryptFor);
|
|
66
|
+
const nonce = _tweetnacl.default.randomBytes(_tweetnacl.default.box.nonceLength);
|
|
67
|
+
const payloadBytes = _buffer.Buffer.from(JSON.stringify(payload), 'utf8');
|
|
68
|
+
const encryptedPayload = _tweetnacl.default.box(payloadBytes, nonce, phantomPublicKeyBytes, this.dappEncryptionKeyPair.secretKey);
|
|
69
|
+
return {
|
|
70
|
+
nonce: _bs.default.encode(nonce),
|
|
71
|
+
encryptedPayload: _bs.default.encode(encryptedPayload)
|
|
72
|
+
};
|
|
73
|
+
} catch (error) {
|
|
74
|
+
return null;
|
|
75
|
+
}
|
|
76
|
+
}
|
|
77
|
+
decryptPayload(encryptedDataBs58, nonceBs58, phantomSenderPublicKeyBs58) {
|
|
78
|
+
try {
|
|
79
|
+
const encryptedDataBytes = _bs.default.decode(encryptedDataBs58);
|
|
80
|
+
const nonceBytes = _bs.default.decode(nonceBs58);
|
|
81
|
+
const phantomSenderPublicKeyBytes = _bs.default.decode(phantomSenderPublicKeyBs58);
|
|
82
|
+
const decryptedPayloadBytes = _tweetnacl.default.box.open(encryptedDataBytes, nonceBytes, phantomSenderPublicKeyBytes, this.dappEncryptionKeyPair.secretKey);
|
|
83
|
+
if (!decryptedPayloadBytes) {
|
|
84
|
+
return null;
|
|
85
|
+
}
|
|
86
|
+
return JSON.parse(_buffer.Buffer.from(decryptedPayloadBytes).toString('utf8'));
|
|
87
|
+
} catch (error) {
|
|
88
|
+
return null;
|
|
89
|
+
}
|
|
90
|
+
}
|
|
91
|
+
async restoreSession() {
|
|
92
|
+
try {
|
|
93
|
+
const storedSessionJson = await this.storage.getItem(PHANTOM_PROVIDER_STORAGE_KEY);
|
|
94
|
+
if (storedSessionJson) {
|
|
95
|
+
const session = JSON.parse(storedSessionJson);
|
|
96
|
+
this.setSession(session);
|
|
97
|
+
return true;
|
|
98
|
+
}
|
|
99
|
+
return false;
|
|
100
|
+
} catch (error) {
|
|
101
|
+
// console.error('PhantomProvider: Failed to restore session.', error);
|
|
102
|
+
await this.clearSessionStorage(); // Clear potentially corrupt data
|
|
103
|
+
|
|
104
|
+
return false;
|
|
105
|
+
}
|
|
106
|
+
}
|
|
107
|
+
async saveSession() {
|
|
108
|
+
if (!this.sessionToken || !this.userPublicKey || !this.phantomEncryptionPublicKeyBs58) {
|
|
109
|
+
return; // Cannot save incomplete session
|
|
110
|
+
}
|
|
111
|
+
|
|
112
|
+
const session = {
|
|
113
|
+
sessionToken: this.sessionToken,
|
|
114
|
+
userPublicKey: this.userPublicKey,
|
|
115
|
+
phantomEncryptionPublicKeyBs58: this.phantomEncryptionPublicKeyBs58,
|
|
116
|
+
cluster: this.currentCluster
|
|
117
|
+
};
|
|
118
|
+
try {
|
|
119
|
+
await this.storage.setItem(PHANTOM_PROVIDER_STORAGE_KEY, JSON.stringify(session));
|
|
120
|
+
} catch (error) {
|
|
121
|
+
// console.error('PhantomProvider: Failed to save session.', error);
|
|
122
|
+
}
|
|
123
|
+
}
|
|
124
|
+
async clearSessionStorage() {
|
|
125
|
+
try {
|
|
126
|
+
await this.storage.removeItem(PHANTOM_PROVIDER_STORAGE_KEY);
|
|
127
|
+
} catch (error) {
|
|
128
|
+
// console.error('PhantomProvider: Failed to clear session storage.', error);
|
|
129
|
+
}
|
|
130
|
+
}
|
|
131
|
+
async connect(params) {
|
|
132
|
+
const cluster = params?.cluster ?? 'mainnet-beta';
|
|
133
|
+
this.currentCluster = cluster;
|
|
134
|
+
const redirectLink = `${this.config.appScheme}://phantom_connect`;
|
|
135
|
+
const connectDeeplinkParams = {
|
|
136
|
+
app_url: this.config.dappUrl,
|
|
137
|
+
dapp_encryption_public_key: _bs.default.encode(this.dappEncryptionKeyPair.publicKey),
|
|
138
|
+
redirect_link: redirectLink,
|
|
139
|
+
cluster
|
|
140
|
+
};
|
|
141
|
+
const url = this.buildUrl('connect', connectDeeplinkParams);
|
|
142
|
+
return new Promise((resolve, reject) => {
|
|
143
|
+
let subscription = null;
|
|
144
|
+
const handleDeepLink = async event => {
|
|
145
|
+
if (subscription) {
|
|
146
|
+
subscription.remove();
|
|
147
|
+
}
|
|
148
|
+
const fullUrl = event.url;
|
|
149
|
+
if (fullUrl.startsWith(redirectLink)) {
|
|
150
|
+
const responseUrlParams = new URLSearchParams(fullUrl.substring(fullUrl.indexOf('?') + 1));
|
|
151
|
+
const errorCode = responseUrlParams.get('errorCode');
|
|
152
|
+
const errorMessage = responseUrlParams.get('errorMessage');
|
|
153
|
+
if (errorCode) {
|
|
154
|
+
return reject(new Error(`Phantom Connection Failed: ${errorMessage || 'Unknown error'} (Code: ${errorCode})`));
|
|
155
|
+
}
|
|
156
|
+
const responsePayload = {
|
|
157
|
+
phantom_encryption_public_key: responseUrlParams.get('phantom_encryption_public_key'),
|
|
158
|
+
nonce: responseUrlParams.get('nonce'),
|
|
159
|
+
data: responseUrlParams.get('data')
|
|
160
|
+
};
|
|
161
|
+
if (!responsePayload.phantom_encryption_public_key || !responsePayload.nonce || !responsePayload.data) {
|
|
162
|
+
return reject(new Error('Phantom Connect: Invalid response - missing parameters.'));
|
|
163
|
+
}
|
|
164
|
+
const decryptedData = this.decryptPayload(responsePayload.data, responsePayload.nonce, responsePayload.phantom_encryption_public_key);
|
|
165
|
+
if (!decryptedData || !decryptedData.public_key || !decryptedData.session) {
|
|
166
|
+
return reject(new Error('Phantom Connect: Failed to decrypt or invalid decrypted data.'));
|
|
167
|
+
}
|
|
168
|
+
this.userPublicKey = decryptedData.public_key;
|
|
169
|
+
this.sessionToken = decryptedData.session;
|
|
170
|
+
this.phantomEncryptionPublicKeyBs58 = responsePayload.phantom_encryption_public_key;
|
|
171
|
+
|
|
172
|
+
// Save session on successful connect
|
|
173
|
+
this.saveSession();
|
|
174
|
+
resolve({
|
|
175
|
+
userPublicKey: this.userPublicKey,
|
|
176
|
+
sessionToken: this.sessionToken,
|
|
177
|
+
phantomEncryptionPublicKeyBs58: this.phantomEncryptionPublicKeyBs58,
|
|
178
|
+
cluster
|
|
179
|
+
});
|
|
180
|
+
} else {
|
|
181
|
+
reject(new Error('Phantom Connect: Unexpected redirect URI.'));
|
|
182
|
+
}
|
|
183
|
+
};
|
|
184
|
+
subscription = _reactNative.Linking.addEventListener('url', handleDeepLink);
|
|
185
|
+
_reactNative.Linking.openURL(url).catch(err => {
|
|
186
|
+
if (subscription) {
|
|
187
|
+
subscription.remove();
|
|
188
|
+
}
|
|
189
|
+
reject(new Error(`Failed to open Phantom wallet: ${err.message}. Is it installed?`));
|
|
190
|
+
});
|
|
191
|
+
});
|
|
192
|
+
}
|
|
193
|
+
async disconnect() {
|
|
194
|
+
if (!this.sessionToken || !this.phantomEncryptionPublicKeyBs58) {
|
|
195
|
+
await this.clearSession();
|
|
196
|
+
return Promise.resolve();
|
|
197
|
+
}
|
|
198
|
+
const payloadToEncrypt = {
|
|
199
|
+
session: this.sessionToken
|
|
200
|
+
};
|
|
201
|
+
const encryptedDisconnectPayload = this.encryptPayload(payloadToEncrypt, this.phantomEncryptionPublicKeyBs58);
|
|
202
|
+
if (!encryptedDisconnectPayload) {
|
|
203
|
+
// console.warn('PhantomProvider: Failed to encrypt disconnect payload. Clearing session locally.');
|
|
204
|
+
await this.clearSession();
|
|
205
|
+
return Promise.resolve(); // Or reject, depending on desired strictness
|
|
206
|
+
}
|
|
207
|
+
|
|
208
|
+
const redirectLink = `${this.config.appScheme}://phantom_disconnect`;
|
|
209
|
+
const disconnectDeeplinkParams = {
|
|
210
|
+
dapp_encryption_public_key: _bs.default.encode(this.dappEncryptionKeyPair.publicKey),
|
|
211
|
+
redirect_link: redirectLink,
|
|
212
|
+
payload: encryptedDisconnectPayload.encryptedPayload,
|
|
213
|
+
nonce: encryptedDisconnectPayload.nonce
|
|
214
|
+
};
|
|
215
|
+
const url = this.buildUrl('disconnect', disconnectDeeplinkParams);
|
|
216
|
+
return new Promise((resolve, reject) => {
|
|
217
|
+
let subscription = null;
|
|
218
|
+
const handleDeepLink = event => {
|
|
219
|
+
if (subscription) {
|
|
220
|
+
subscription.remove();
|
|
221
|
+
}
|
|
222
|
+
if (event.url.startsWith(redirectLink)) {
|
|
223
|
+
this.clearSession();
|
|
224
|
+
resolve();
|
|
225
|
+
} else {
|
|
226
|
+
this.clearSession();
|
|
227
|
+
reject(new Error('Phantom Disconnect: Unexpected redirect URI.'));
|
|
228
|
+
}
|
|
229
|
+
};
|
|
230
|
+
subscription = _reactNative.Linking.addEventListener('url', handleDeepLink);
|
|
231
|
+
_reactNative.Linking.openURL(url).catch(err => {
|
|
232
|
+
if (subscription) {
|
|
233
|
+
subscription.remove();
|
|
234
|
+
}
|
|
235
|
+
this.clearSession();
|
|
236
|
+
reject(new Error(`Failed to open Phantom for disconnection: ${err.message}.`));
|
|
237
|
+
});
|
|
238
|
+
});
|
|
239
|
+
}
|
|
240
|
+
async clearSession() {
|
|
241
|
+
this.sessionToken = null;
|
|
242
|
+
this.userPublicKey = null;
|
|
243
|
+
this.phantomEncryptionPublicKeyBs58 = null;
|
|
244
|
+
await this.clearSessionStorage();
|
|
245
|
+
}
|
|
246
|
+
setSession(session) {
|
|
247
|
+
this.sessionToken = session.sessionToken;
|
|
248
|
+
this.userPublicKey = session.userPublicKey;
|
|
249
|
+
this.phantomEncryptionPublicKeyBs58 = session.phantomEncryptionPublicKeyBs58;
|
|
250
|
+
this.currentCluster = session.cluster;
|
|
251
|
+
}
|
|
252
|
+
async request(args, _chainId) {
|
|
253
|
+
if (!isValidSolanaSigningMethod(args.method)) {
|
|
254
|
+
throw new Error(`PhantomProvider: Unsupported method: ${args.method}. Only Solana signing methods are supported.`);
|
|
255
|
+
}
|
|
256
|
+
const signingMethod = args.method;
|
|
257
|
+
const requestParams = args.params;
|
|
258
|
+
if (!this.isConnected() || !this.sessionToken || !this.phantomEncryptionPublicKeyBs58) {
|
|
259
|
+
throw new Error('PhantomProvider: Not connected or session details missing. Cannot process request.');
|
|
260
|
+
}
|
|
261
|
+
const rpcMethodName = this.getRpcMethodName(signingMethod);
|
|
262
|
+
const redirectSuffix = rpcMethodName.toLowerCase();
|
|
263
|
+
const redirectLink = `${this.config.appScheme}://phantom_${redirectSuffix}`;
|
|
264
|
+
let deeplinkUrl = '';
|
|
265
|
+
switch (signingMethod) {
|
|
266
|
+
case SOLANA_SIGNING_METHODS.SOLANA_SIGN_TRANSACTION:
|
|
267
|
+
case SOLANA_SIGNING_METHODS.SOLANA_SIGN_AND_SEND_TRANSACTION:
|
|
268
|
+
{
|
|
269
|
+
const typedParams = requestParams;
|
|
270
|
+
if (!typedParams || typeof typedParams.transaction !== 'string') {
|
|
271
|
+
throw new Error(`Missing or invalid 'transaction' (base58 string) in params for ${signingMethod}`);
|
|
272
|
+
}
|
|
273
|
+
const dataToEncrypt = {
|
|
274
|
+
session: this.sessionToken,
|
|
275
|
+
transaction: typedParams.transaction
|
|
276
|
+
};
|
|
277
|
+
const encryptedData = this.encryptPayload(dataToEncrypt, this.phantomEncryptionPublicKeyBs58);
|
|
278
|
+
if (!encryptedData) {
|
|
279
|
+
throw new Error(`PhantomProvider: Failed to encrypt payload for ${signingMethod}.`);
|
|
280
|
+
}
|
|
281
|
+
const signTxDeeplinkParams = {
|
|
282
|
+
dapp_encryption_public_key: _bs.default.encode(this.dappEncryptionKeyPair.publicKey),
|
|
283
|
+
redirect_link: redirectLink,
|
|
284
|
+
cluster: this.currentCluster,
|
|
285
|
+
payload: encryptedData.encryptedPayload,
|
|
286
|
+
nonce: encryptedData.nonce
|
|
287
|
+
};
|
|
288
|
+
deeplinkUrl = this.buildUrl(rpcMethodName, signTxDeeplinkParams);
|
|
289
|
+
break;
|
|
290
|
+
}
|
|
291
|
+
case SOLANA_SIGNING_METHODS.SOLANA_SIGN_MESSAGE:
|
|
292
|
+
{
|
|
293
|
+
const typedParams = requestParams;
|
|
294
|
+
if (!typedParams || typeof typedParams.message === 'undefined') {
|
|
295
|
+
throw new Error(`Missing 'message' in params for ${signingMethod}`);
|
|
296
|
+
}
|
|
297
|
+
let messageBs58;
|
|
298
|
+
if (typedParams.message instanceof Uint8Array) {
|
|
299
|
+
messageBs58 = _bs.default.encode(typedParams.message);
|
|
300
|
+
} else if (typeof typedParams.message === 'string') {
|
|
301
|
+
try {
|
|
302
|
+
_bs.default.decode(typedParams.message);
|
|
303
|
+
messageBs58 = typedParams.message;
|
|
304
|
+
} catch (e) {
|
|
305
|
+
messageBs58 = _bs.default.encode(_buffer.Buffer.from(typedParams.message));
|
|
306
|
+
}
|
|
307
|
+
} else {
|
|
308
|
+
throw new Error('Invalid message format for signMessage. Expected Uint8Array or string.');
|
|
309
|
+
}
|
|
310
|
+
const dataToEncrypt = {
|
|
311
|
+
message: messageBs58,
|
|
312
|
+
session: this.sessionToken,
|
|
313
|
+
display: typedParams.display || 'utf8'
|
|
314
|
+
};
|
|
315
|
+
const encryptedPayloadData = this.encryptPayload(dataToEncrypt, this.phantomEncryptionPublicKeyBs58);
|
|
316
|
+
if (!encryptedPayloadData) {
|
|
317
|
+
throw new Error('PhantomProvider: Failed to encrypt payload for signMessage.');
|
|
318
|
+
}
|
|
319
|
+
const signMsgDeeplinkQueryPayload = {
|
|
320
|
+
dapp_encryption_public_key: _bs.default.encode(this.dappEncryptionKeyPair.publicKey),
|
|
321
|
+
redirect_link: redirectLink,
|
|
322
|
+
payload: encryptedPayloadData.encryptedPayload,
|
|
323
|
+
nonce: encryptedPayloadData.nonce
|
|
324
|
+
};
|
|
325
|
+
deeplinkUrl = this.buildUrl(rpcMethodName, signMsgDeeplinkQueryPayload);
|
|
326
|
+
break;
|
|
327
|
+
}
|
|
328
|
+
case SOLANA_SIGNING_METHODS.SOLANA_SIGN_ALL_TRANSACTIONS:
|
|
329
|
+
{
|
|
330
|
+
const typedParams = requestParams;
|
|
331
|
+
if (!typedParams || !Array.isArray(typedParams.transactions) || !typedParams.transactions.every(t => typeof t === 'string')) {
|
|
332
|
+
throw new Error(`Missing or invalid 'transactions' (array of base58 strings) in params for ${signingMethod}`);
|
|
333
|
+
}
|
|
334
|
+
const dataToEncrypt = {
|
|
335
|
+
session: this.sessionToken,
|
|
336
|
+
transactions: typedParams.transactions
|
|
337
|
+
};
|
|
338
|
+
const encryptedData = this.encryptPayload(dataToEncrypt, this.phantomEncryptionPublicKeyBs58);
|
|
339
|
+
if (!encryptedData) {
|
|
340
|
+
throw new Error(`PhantomProvider: Failed to encrypt payload for ${signingMethod}.`);
|
|
341
|
+
}
|
|
342
|
+
const signAllTxDeeplinkParams = {
|
|
343
|
+
dapp_encryption_public_key: _bs.default.encode(this.dappEncryptionKeyPair.publicKey),
|
|
344
|
+
redirect_link: redirectLink,
|
|
345
|
+
cluster: this.currentCluster,
|
|
346
|
+
payload: encryptedData.encryptedPayload,
|
|
347
|
+
nonce: encryptedData.nonce
|
|
348
|
+
};
|
|
349
|
+
deeplinkUrl = this.buildUrl(rpcMethodName, signAllTxDeeplinkParams);
|
|
350
|
+
break;
|
|
351
|
+
}
|
|
352
|
+
default:
|
|
353
|
+
{
|
|
354
|
+
throw new Error(`PhantomProvider: Unhandled signing method: ${signingMethod}`);
|
|
355
|
+
}
|
|
356
|
+
}
|
|
357
|
+
return new Promise((resolve, reject) => {
|
|
358
|
+
let subscription = null;
|
|
359
|
+
const handleDeepLink = async event => {
|
|
360
|
+
if (subscription) {
|
|
361
|
+
subscription.remove();
|
|
362
|
+
}
|
|
363
|
+
const fullUrl = event.url;
|
|
364
|
+
if (fullUrl.startsWith(redirectLink)) {
|
|
365
|
+
const responseUrlParams = new URLSearchParams(fullUrl.substring(fullUrl.indexOf('?') + 1));
|
|
366
|
+
const errorCode = responseUrlParams.get('errorCode');
|
|
367
|
+
const errorMessage = responseUrlParams.get('errorMessage');
|
|
368
|
+
if (errorCode) {
|
|
369
|
+
return reject(new Error(`Phantom ${signingMethod} Failed: ${errorMessage || 'Unknown error'} (Code: ${errorCode})`));
|
|
370
|
+
}
|
|
371
|
+
const responseNonce = responseUrlParams.get('nonce');
|
|
372
|
+
const responseData = responseUrlParams.get('data');
|
|
373
|
+
if (!responseNonce || !responseData) {
|
|
374
|
+
return reject(new Error(`Phantom ${signingMethod}: Invalid response - missing nonce or data.`));
|
|
375
|
+
}
|
|
376
|
+
const decryptedResult = this.decryptPayload(responseData, responseNonce, this.phantomEncryptionPublicKeyBs58);
|
|
377
|
+
if (!decryptedResult) {
|
|
378
|
+
return reject(new Error(`Phantom ${signingMethod}: Failed to decrypt response or invalid decrypted data.`));
|
|
379
|
+
}
|
|
380
|
+
resolve(decryptedResult);
|
|
381
|
+
} else {
|
|
382
|
+
reject(new Error(`Phantom ${signingMethod}: Unexpected redirect URI.`));
|
|
383
|
+
}
|
|
384
|
+
};
|
|
385
|
+
subscription = _reactNative.Linking.addEventListener('url', handleDeepLink);
|
|
386
|
+
_reactNative.Linking.openURL(deeplinkUrl).catch(err => {
|
|
387
|
+
if (subscription) {
|
|
388
|
+
subscription.remove();
|
|
389
|
+
}
|
|
390
|
+
reject(new Error(`Failed to open Phantom for ${signingMethod}: ${err.message}. Is it installed?`));
|
|
391
|
+
});
|
|
392
|
+
});
|
|
393
|
+
}
|
|
394
|
+
}
|
|
395
|
+
exports.PhantomProvider = PhantomProvider;
|
|
396
|
+
//# sourceMappingURL=PhantomProvider.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"names":["_reactNative","require","_tweetnacl","_interopRequireDefault","_bs","_buffer","_events","e","__esModule","default","PHANTOM_BASE_URL","PHANTOM_PROVIDER_STORAGE_KEY","SOLANA_SIGNING_METHODS","exports","SOLANA_SIGN_TRANSACTION","SOLANA_SIGN_MESSAGE","SOLANA_SIGN_AND_SEND_TRANSACTION","SOLANA_SIGN_ALL_TRANSACTIONS","isValidSolanaSigningMethod","method","Object","values","includes","PhantomProvider","EventEmitter","currentCluster","sessionToken","userPublicKey","phantomEncryptionPublicKeyBs58","constructor","config","dappEncryptionKeyPair","storage","getUserPublicKey","isConnected","buildUrl","rpcMethod","params","query","URLSearchParams","toString","getRpcMethodName","Error","encryptPayload","payload","phantomPublicKeyBs58ToEncryptFor","phantomPublicKeyBytes","bs58","decode","nonce","nacl","randomBytes","box","nonceLength","payloadBytes","Buffer","from","JSON","stringify","encryptedPayload","secretKey","encode","error","decryptPayload","encryptedDataBs58","nonceBs58","phantomSenderPublicKeyBs58","encryptedDataBytes","nonceBytes","phantomSenderPublicKeyBytes","decryptedPayloadBytes","open","parse","restoreSession","storedSessionJson","getItem","session","setSession","clearSessionStorage","saveSession","cluster","setItem","removeItem","connect","redirectLink","appScheme","connectDeeplinkParams","app_url","dappUrl","dapp_encryption_public_key","publicKey","redirect_link","url","Promise","resolve","reject","subscription","handleDeepLink","event","remove","fullUrl","startsWith","responseUrlParams","substring","indexOf","errorCode","get","errorMessage","responsePayload","phantom_encryption_public_key","data","decryptedData","public_key","Linking","addEventListener","openURL","catch","err","message","disconnect","clearSession","payloadToEncrypt","encryptedDisconnectPayload","disconnectDeeplinkParams","request","args","_chainId","signingMethod","requestParams","rpcMethodName","redirectSuffix","toLowerCase","deeplinkUrl","typedParams","transaction","dataToEncrypt","encryptedData","signTxDeeplinkParams","messageBs58","Uint8Array","display","encryptedPayloadData","signMsgDeeplinkQueryPayload","Array","isArray","transactions","every","t","signAllTxDeeplinkParams","responseNonce","responseData","decryptedResult"],"sourceRoot":"../../../src","sources":["providers/PhantomProvider.ts"],"mappings":";;;;;;AAAA,IAAAA,YAAA,GAAAC,OAAA;AACA,IAAAC,UAAA,GAAAC,sBAAA,CAAAF,OAAA;AACA,IAAAG,GAAA,GAAAD,sBAAA,CAAAF,OAAA;AACA,IAAAI,OAAA,GAAAJ,OAAA;AAwBA,IAAAK,OAAA,GAAAH,sBAAA,CAAAF,OAAA;AAAkC,SAAAE,uBAAAI,CAAA,WAAAA,CAAA,IAAAA,CAAA,CAAAC,UAAA,GAAAD,CAAA,KAAAE,OAAA,EAAAF,CAAA;AAElC,MAAMG,gBAAgB,GAAG,2BAA2B;AACpD,MAAMC,4BAA4B,GAAG,kCAAkC;AAEhE,MAAMC,sBAAsB,GAAAC,OAAA,CAAAD,sBAAA,GAAG;EACpCE,uBAAuB,EAAE,wBAAwB;EACjDC,mBAAmB,EAAE,oBAAoB;EACzCC,gCAAgC,EAAE,+BAA+B;EACjEC,4BAA4B,EAAE;AAChC,CAAU;AAIV,SAASC,0BAA0BA,CAACC,MAAc,EAAiC;EACjF,OAAOC,MAAM,CAACC,MAAM,CAACT,sBAAsB,CAAC,CAACU,QAAQ,CAACH,MAA6B,CAAC;AACtF;AAEO,MAAMI,eAAe,SAASC,eAAY,CAAqB;EAG5DC,cAAc,GAAmB,cAAc;EAI/CC,YAAY,GAAkB,IAAI;EAClCC,aAAa,GAAkB,IAAI;EACnCC,8BAA8B,GAAkB,IAAI;EAE5DC,WAAWA,CAACC,MAA6B,EAAE;IACzC,KAAK,CAAC,CAAC;IACP,IAAI,CAACA,MAAM,GAAGA,MAAM;IACpB,IAAI,CAACC,qBAAqB,GAAGD,MAAM,CAACC,qBAAqB;IACzD,IAAI,CAACC,OAAO,GAAGF,MAAM,CAACE,OAAO;EAC/B;EAEAC,gBAAgBA,CAAA,EAAkB;IAChC,OAAO,IAAI,CAACN,aAAa;EAC3B;EAEAO,WAAWA,CAAA,EAAY;IACrB,OAAO,CAAC,CAAC,IAAI,CAACR,YAAY,IAAI,CAAC,CAAC,IAAI,CAACC,aAAa,IAAI,CAAC,CAAC,IAAI,CAACI,qBAAqB;EACpF;EAEQI,QAAQA,CAACC,SAA2B,EAAEC,MAA8B,EAAU;IACpF,MAAMC,KAAK,GAAG,IAAIC,eAAe,CAACF,MAAM,CAAC,CAACG,QAAQ,CAAC,CAAC;IAEpD,OAAQ,GAAE9B,gBAAiB,IAAG0B,SAAU,IAAGE,KAAM,EAAC;EACpD;EAEQG,gBAAgBA,CAACtB,MAA2B,EAAoB;IACtE,QAAQA,MAAM;MACZ,KAAKP,sBAAsB,CAACE,uBAAuB;QACjD,OAAO,iBAAiB;MAC1B,KAAKF,sBAAsB,CAACI,gCAAgC;QAC1D,OAAO,wBAAwB;MACjC,KAAKJ,sBAAsB,CAACK,4BAA4B;QACtD,OAAO,qBAAqB;MAC9B,KAAKL,sBAAsB,CAACG,mBAAmB;QAC7C,OAAO,aAAa;MACtB;QACE;QACA,MAAM,IAAI2B,KAAK,CAAE,sCAAqCvB,MAAO,EAAC,CAAC;IACnE;EACF;EAEQwB,cAAcA,CACpBC,OAAgC,EAChCC,gCAAwC,EACY;IACpD,IAAI,CAACA,gCAAgC,EAAE;MACrC,OAAO,IAAI;IACb;IACA,IAAI;MACF,MAAMC,qBAAqB,GAAGC,WAAI,CAACC,MAAM,CAACH,gCAAgC,CAAC;MAC3E,MAAMI,KAAK,GAAGC,kBAAI,CAACC,WAAW,CAACD,kBAAI,CAACE,GAAG,CAACC,WAAW,CAAC;MACpD,MAAMC,YAAY,GAAGC,cAAM,CAACC,IAAI,CAACC,IAAI,CAACC,SAAS,CAACd,OAAO,CAAC,EAAE,MAAM,CAAC;MACjE,MAAMe,gBAAgB,GAAGT,kBAAI,CAACE,GAAG,CAC/BE,YAAY,EACZL,KAAK,EACLH,qBAAqB,EACrB,IAAI,CAACf,qBAAqB,CAAC6B,SAC7B,CAAC;MAED,OAAO;QACLX,KAAK,EAAEF,WAAI,CAACc,MAAM,CAACZ,KAAK,CAAC;QACzBU,gBAAgB,EAAEZ,WAAI,CAACc,MAAM,CAACF,gBAAgB;MAChD,CAAC;IACH,CAAC,CAAC,OAAOG,KAAK,EAAE;MACd,OAAO,IAAI;IACb;EACF;EAEQC,cAAcA,CACpBC,iBAAyB,EACzBC,SAAiB,EACjBC,0BAAkC,EACxB;IACV,IAAI;MACF,MAAMC,kBAAkB,GAAGpB,WAAI,CAACC,MAAM,CAACgB,iBAAiB,CAAC;MACzD,MAAMI,UAAU,GAAGrB,WAAI,CAACC,MAAM,CAACiB,SAAS,CAAC;MACzC,MAAMI,2BAA2B,GAAGtB,WAAI,CAACC,MAAM,CAACkB,0BAA0B,CAAC;MAC3E,MAAMI,qBAAqB,GAAGpB,kBAAI,CAACE,GAAG,CAACmB,IAAI,CACzCJ,kBAAkB,EAClBC,UAAU,EACVC,2BAA2B,EAC3B,IAAI,CAACtC,qBAAqB,CAAC6B,SAC7B,CAAC;MACD,IAAI,CAACU,qBAAqB,EAAE;QAC1B,OAAO,IAAI;MACb;MAEA,OAAOb,IAAI,CAACe,KAAK,CAACjB,cAAM,CAACC,IAAI,CAACc,qBAAqB,CAAC,CAAC9B,QAAQ,CAAC,MAAM,CAAC,CAAC;IACxE,CAAC,CAAC,OAAOsB,KAAK,EAAE;MACd,OAAO,IAAI;IACb;EACF;EAEA,MAAaW,cAAcA,CAAA,EAAqB;IAC9C,IAAI;MACF,MAAMC,iBAAiB,GAAG,MAAM,IAAI,CAAC1C,OAAO,CAAC2C,OAAO,CAAChE,4BAA4B,CAAC;MAClF,IAAI+D,iBAAiB,EAAE;QACrB,MAAME,OAAuB,GAAGnB,IAAI,CAACe,KAAK,CAACE,iBAAiB,CAAC;QAC7D,IAAI,CAACG,UAAU,CAACD,OAAO,CAAC;QAExB,OAAO,IAAI;MACb;MAEA,OAAO,KAAK;IACd,CAAC,CAAC,OAAOd,KAAK,EAAE;MACd;MACA,MAAM,IAAI,CAACgB,mBAAmB,CAAC,CAAC,CAAC,CAAC;;MAElC,OAAO,KAAK;IACd;EACF;EAEA,MAAcC,WAAWA,CAAA,EAAkB;IACzC,IAAI,CAAC,IAAI,CAACrD,YAAY,IAAI,CAAC,IAAI,CAACC,aAAa,IAAI,CAAC,IAAI,CAACC,8BAA8B,EAAE;MACrF,OAAO,CAAC;IACV;;IACA,MAAMgD,OAAuB,GAAG;MAC9BlD,YAAY,EAAE,IAAI,CAACA,YAAY;MAC/BC,aAAa,EAAE,IAAI,CAACA,aAAa;MACjCC,8BAA8B,EAAE,IAAI,CAACA,8BAA8B;MACnEoD,OAAO,EAAE,IAAI,CAACvD;IAChB,CAAC;IACD,IAAI;MACF,MAAM,IAAI,CAACO,OAAO,CAACiD,OAAO,CAACtE,4BAA4B,EAAE8C,IAAI,CAACC,SAAS,CAACkB,OAAO,CAAC,CAAC;IACnF,CAAC,CAAC,OAAOd,KAAK,EAAE;MACd;IAAA;EAEJ;EAEA,MAAcgB,mBAAmBA,CAAA,EAAkB;IACjD,IAAI;MACF,MAAM,IAAI,CAAC9C,OAAO,CAACkD,UAAU,CAACvE,4BAA4B,CAAC;IAC7D,CAAC,CAAC,OAAOmD,KAAK,EAAE;MACd;IAAA;EAEJ;EAEA,MAAaqB,OAAOA,CAA2B9C,MAE9C,EAAc;IACb,MAAM2C,OAAO,GAAG3C,MAAM,EAAE2C,OAAO,IAAI,cAAc;IACjD,IAAI,CAACvD,cAAc,GAAGuD,OAAO;IAC7B,MAAMI,YAAY,GAAI,GAAE,IAAI,CAACtD,MAAM,CAACuD,SAAU,oBAAmB;IACjE,MAAMC,qBAA2C,GAAG;MAClDC,OAAO,EAAE,IAAI,CAACzD,MAAM,CAAC0D,OAAO;MAC5BC,0BAA0B,EAAE1C,WAAI,CAACc,MAAM,CAAC,IAAI,CAAC9B,qBAAqB,CAAC2D,SAAS,CAAC;MAC7EC,aAAa,EAAEP,YAAY;MAC3BJ;IACF,CAAC;IACD,MAAMY,GAAG,GAAG,IAAI,CAACzD,QAAQ,CAAC,SAAS,EAAEmD,qBAA4B,CAAC;IAElE,OAAO,IAAIO,OAAO,CAAuB,CAACC,OAAO,EAAEC,MAAM,KAAK;MAC5D,IAAIC,YAA2C,GAAG,IAAI;MACtD,MAAMC,cAAc,GAAG,MAAOC,KAAsB,IAAK;QACvD,IAAIF,YAAY,EAAE;UAChBA,YAAY,CAACG,MAAM,CAAC,CAAC;QACvB;QACA,MAAMC,OAAO,GAAGF,KAAK,CAACN,GAAG;QACzB,IAAIQ,OAAO,CAACC,UAAU,CAACjB,YAAY,CAAC,EAAE;UACpC,MAAMkB,iBAAiB,GAAG,IAAI/D,eAAe,CAC3C6D,OAAO,CAACG,SAAS,CAACH,OAAO,CAACI,OAAO,CAAC,GAAG,CAAC,GAAG,CAAC,CAC5C,CAAC;UACD,MAAMC,SAAS,GAAGH,iBAAiB,CAACI,GAAG,CAAC,WAAW,CAAC;UACpD,MAAMC,YAAY,GAAGL,iBAAiB,CAACI,GAAG,CAAC,cAAc,CAAC;UAC1D,IAAID,SAAS,EAAE;YACb,OAAOV,MAAM,CACX,IAAIrD,KAAK,CACN,8BAA6BiE,YAAY,IAAI,eAAgB,WAAUF,SAAU,GACpF,CACF,CAAC;UACH;UACA,MAAMG,eAAwC,GAAG;YAC/CC,6BAA6B,EAAEP,iBAAiB,CAACI,GAAG,CAAC,+BAA+B,CAAE;YACtFzD,KAAK,EAAEqD,iBAAiB,CAACI,GAAG,CAAC,OAAO,CAAE;YACtCI,IAAI,EAAER,iBAAiB,CAACI,GAAG,CAAC,MAAM;UACpC,CAAC;UACD,IACE,CAACE,eAAe,CAACC,6BAA6B,IAC9C,CAACD,eAAe,CAAC3D,KAAK,IACtB,CAAC2D,eAAe,CAACE,IAAI,EACrB;YACA,OAAOf,MAAM,CAAC,IAAIrD,KAAK,CAAC,yDAAyD,CAAC,CAAC;UACrF;UACA,MAAMqE,aAAa,GAAG,IAAI,CAAChD,cAAc,CACvC6C,eAAe,CAACE,IAAI,EACpBF,eAAe,CAAC3D,KAAK,EACrB2D,eAAe,CAACC,6BAClB,CAAC;UACD,IAAI,CAACE,aAAa,IAAI,CAACA,aAAa,CAACC,UAAU,IAAI,CAACD,aAAa,CAACnC,OAAO,EAAE;YACzE,OAAOmB,MAAM,CACX,IAAIrD,KAAK,CAAC,+DAA+D,CAC3E,CAAC;UACH;UACA,IAAI,CAACf,aAAa,GAAGoF,aAAa,CAACC,UAAU;UAC7C,IAAI,CAACtF,YAAY,GAAGqF,aAAa,CAACnC,OAAO;UACzC,IAAI,CAAChD,8BAA8B,GAAGgF,eAAe,CAACC,6BAA6B;;UAEnF;UACA,IAAI,CAAC9B,WAAW,CAAC,CAAC;UAElBe,OAAO,CAAC;YACNnE,aAAa,EAAE,IAAI,CAACA,aAAa;YACjCD,YAAY,EAAE,IAAI,CAACA,YAAY;YAC/BE,8BAA8B,EAAE,IAAI,CAACA,8BAA8B;YACnEoD;UACF,CAAC,CAAC;QACJ,CAAC,MAAM;UACLe,MAAM,CAAC,IAAIrD,KAAK,CAAC,2CAA2C,CAAC,CAAC;QAChE;MACF,CAAC;MACDsD,YAAY,GAAGiB,oBAAO,CAACC,gBAAgB,CAAC,KAAK,EAAEjB,cAAc,CAAC;MAC9DgB,oBAAO,CAACE,OAAO,CAACvB,GAAG,CAAC,CAACwB,KAAK,CAACC,GAAG,IAAI;QAChC,IAAIrB,YAAY,EAAE;UAChBA,YAAY,CAACG,MAAM,CAAC,CAAC;QACvB;QACAJ,MAAM,CAAC,IAAIrD,KAAK,CAAE,kCAAiC2E,GAAG,CAACC,OAAQ,oBAAmB,CAAC,CAAC;MACtF,CAAC,CAAC;IACJ,CAAC,CAAC;EACJ;EAEA,MAAaC,UAAUA,CAAA,EAAkB;IACvC,IAAI,CAAC,IAAI,CAAC7F,YAAY,IAAI,CAAC,IAAI,CAACE,8BAA8B,EAAE;MAC9D,MAAM,IAAI,CAAC4F,YAAY,CAAC,CAAC;MAEzB,OAAO3B,OAAO,CAACC,OAAO,CAAC,CAAC;IAC1B;IAEA,MAAM2B,gBAAgB,GAAG;MAAE7C,OAAO,EAAE,IAAI,CAAClD;IAAa,CAAC;IACvD,MAAMgG,0BAA0B,GAAG,IAAI,CAAC/E,cAAc,CACpD8E,gBAAgB,EAChB,IAAI,CAAC7F,8BACP,CAAC;IAED,IAAI,CAAC8F,0BAA0B,EAAE;MAC/B;MACA,MAAM,IAAI,CAACF,YAAY,CAAC,CAAC;MAEzB,OAAO3B,OAAO,CAACC,OAAO,CAAC,CAAC,CAAC,CAAC;IAC5B;;IAEA,MAAMV,YAAY,GAAI,GAAE,IAAI,CAACtD,MAAM,CAACuD,SAAU,uBAAsB;IACpE,MAAMsC,wBAAiD,GAAG;MACxDlC,0BAA0B,EAAE1C,WAAI,CAACc,MAAM,CAAC,IAAI,CAAC9B,qBAAqB,CAAC2D,SAAS,CAAC;MAC7EC,aAAa,EAAEP,YAAY;MAC3BxC,OAAO,EAAE8E,0BAA0B,CAAC/D,gBAAgB;MACpDV,KAAK,EAAEyE,0BAA0B,CAACzE;IACpC,CAAC;IACD,MAAM2C,GAAG,GAAG,IAAI,CAACzD,QAAQ,CAAC,YAAY,EAAEwF,wBAA+B,CAAC;IAExE,OAAO,IAAI9B,OAAO,CAAO,CAACC,OAAO,EAAEC,MAAM,KAAK;MAC5C,IAAIC,YAA2C,GAAG,IAAI;MACtD,MAAMC,cAAc,GAAIC,KAAsB,IAAK;QACjD,IAAIF,YAAY,EAAE;UAChBA,YAAY,CAACG,MAAM,CAAC,CAAC;QACvB;QACA,IAAID,KAAK,CAACN,GAAG,CAACS,UAAU,CAACjB,YAAY,CAAC,EAAE;UACtC,IAAI,CAACoC,YAAY,CAAC,CAAC;UACnB1B,OAAO,CAAC,CAAC;QACX,CAAC,MAAM;UACL,IAAI,CAAC0B,YAAY,CAAC,CAAC;UACnBzB,MAAM,CAAC,IAAIrD,KAAK,CAAC,8CAA8C,CAAC,CAAC;QACnE;MACF,CAAC;MACDsD,YAAY,GAAGiB,oBAAO,CAACC,gBAAgB,CAAC,KAAK,EAAEjB,cAAc,CAAC;MAC9DgB,oBAAO,CAACE,OAAO,CAACvB,GAAG,CAAC,CAACwB,KAAK,CAACC,GAAG,IAAI;QAChC,IAAIrB,YAAY,EAAE;UAChBA,YAAY,CAACG,MAAM,CAAC,CAAC;QACvB;QACA,IAAI,CAACqB,YAAY,CAAC,CAAC;QACnBzB,MAAM,CAAC,IAAIrD,KAAK,CAAE,6CAA4C2E,GAAG,CAACC,OAAQ,GAAE,CAAC,CAAC;MAChF,CAAC,CAAC;IACJ,CAAC,CAAC;EACJ;EAEA,MAAaE,YAAYA,CAAA,EAAkB;IACzC,IAAI,CAAC9F,YAAY,GAAG,IAAI;IACxB,IAAI,CAACC,aAAa,GAAG,IAAI;IACzB,IAAI,CAACC,8BAA8B,GAAG,IAAI;IAC1C,MAAM,IAAI,CAACkD,mBAAmB,CAAC,CAAC;EAClC;EAEOD,UAAUA,CAACD,OAAuB,EAAQ;IAC/C,IAAI,CAAClD,YAAY,GAAGkD,OAAO,CAAClD,YAAY;IACxC,IAAI,CAACC,aAAa,GAAGiD,OAAO,CAACjD,aAAa;IAC1C,IAAI,CAACC,8BAA8B,GAAGgD,OAAO,CAAChD,8BAA8B;IAC5E,IAAI,CAACH,cAAc,GAAGmD,OAAO,CAACI,OAAO;EACvC;EAEA,MAAa4C,OAAOA,CAAIC,IAAsB,EAAEC,QAAwB,EAAc;IACpF,IAAI,CAAC5G,0BAA0B,CAAC2G,IAAI,CAAC1G,MAAM,CAAC,EAAE;MAC5C,MAAM,IAAIuB,KAAK,CACZ,wCAAuCmF,IAAI,CAAC1G,MAAO,8CACtD,CAAC;IACH;IACA,MAAM4G,aAAa,GAAGF,IAAI,CAAC1G,MAA6B;IACxD,MAAM6G,aAAa,GAAGH,IAAI,CAACxF,MAAa;IAExC,IAAI,CAAC,IAAI,CAACH,WAAW,CAAC,CAAC,IAAI,CAAC,IAAI,CAACR,YAAY,IAAI,CAAC,IAAI,CAACE,8BAA8B,EAAE;MACrF,MAAM,IAAIc,KAAK,CACb,oFACF,CAAC;IACH;IAEA,MAAMuF,aAAa,GAAG,IAAI,CAACxF,gBAAgB,CAACsF,aAAa,CAAC;IAC1D,MAAMG,cAAc,GAAGD,aAAa,CAACE,WAAW,CAAC,CAAC;IAClD,MAAM/C,YAAY,GAAI,GAAE,IAAI,CAACtD,MAAM,CAACuD,SAAU,cAAa6C,cAAe,EAAC;IAC3E,IAAIE,WAAW,GAAG,EAAE;IAEpB,QAAQL,aAAa;MACnB,KAAKnH,sBAAsB,CAACE,uBAAuB;MACnD,KAAKF,sBAAsB,CAACI,gCAAgC;QAAE;UAC5D,MAAMqH,WAAW,GAAGL,aAA6C;UACjE,IAAI,CAACK,WAAW,IAAI,OAAOA,WAAW,CAACC,WAAW,KAAK,QAAQ,EAAE;YAC/D,MAAM,IAAI5F,KAAK,CACZ,kEAAiEqF,aAAc,EAClF,CAAC;UACH;UAEA,MAAMQ,aAAa,GAAG;YACpB3D,OAAO,EAAE,IAAI,CAAClD,YAAa;YAC3B4G,WAAW,EAAED,WAAW,CAACC;UAC3B,CAAC;UACD,MAAME,aAAa,GAAG,IAAI,CAAC7F,cAAc,CACvC4F,aAAa,EACb,IAAI,CAAC3G,8BACP,CAAC;UACD,IAAI,CAAC4G,aAAa,EAAE;YAClB,MAAM,IAAI9F,KAAK,CAAE,kDAAiDqF,aAAc,GAAE,CAAC;UACrF;UAEA,MAAMU,oBAAkD,GAAG;YACzDhD,0BAA0B,EAAE1C,WAAI,CAACc,MAAM,CAAC,IAAI,CAAC9B,qBAAqB,CAAC2D,SAAS,CAAC;YAC7EC,aAAa,EAAEP,YAAY;YAC3BJ,OAAO,EAAE,IAAI,CAACvD,cAAc;YAC5BmB,OAAO,EAAE4F,aAAa,CAAC7E,gBAAgB;YACvCV,KAAK,EAAEuF,aAAa,CAACvF;UACvB,CAAC;UACDmF,WAAW,GAAG,IAAI,CAACjG,QAAQ,CAAC8F,aAAa,EAAEQ,oBAA2B,CAAC;UACvE;QACF;MACA,KAAK7H,sBAAsB,CAACG,mBAAmB;QAAE;UAC/C,MAAMsH,WAAW,GAAGL,aAAyC;UAC7D,IAAI,CAACK,WAAW,IAAI,OAAOA,WAAW,CAACf,OAAO,KAAK,WAAW,EAAE;YAC9D,MAAM,IAAI5E,KAAK,CAAE,mCAAkCqF,aAAc,EAAC,CAAC;UACrE;UAEA,IAAIW,WAAmB;UACvB,IAAIL,WAAW,CAACf,OAAO,YAAYqB,UAAU,EAAE;YAC7CD,WAAW,GAAG3F,WAAI,CAACc,MAAM,CAACwE,WAAW,CAACf,OAAO,CAAC;UAChD,CAAC,MAAM,IAAI,OAAOe,WAAW,CAACf,OAAO,KAAK,QAAQ,EAAE;YAClD,IAAI;cACFvE,WAAI,CAACC,MAAM,CAACqF,WAAW,CAACf,OAAO,CAAC;cAChCoB,WAAW,GAAGL,WAAW,CAACf,OAAO;YACnC,CAAC,CAAC,OAAO/G,CAAC,EAAE;cACVmI,WAAW,GAAG3F,WAAI,CAACc,MAAM,CAACN,cAAM,CAACC,IAAI,CAAC6E,WAAW,CAACf,OAAO,CAAC,CAAC;YAC7D;UACF,CAAC,MAAM;YACL,MAAM,IAAI5E,KAAK,CAAC,wEAAwE,CAAC;UAC3F;UAEA,MAAM6F,aAAa,GAAG;YACpBjB,OAAO,EAAEoB,WAAW;YACpB9D,OAAO,EAAE,IAAI,CAAClD,YAAa;YAC3BkH,OAAO,EAAEP,WAAW,CAACO,OAAO,IAAI;UAClC,CAAC;UAED,MAAMC,oBAAoB,GAAG,IAAI,CAAClG,cAAc,CAC9C4F,aAAa,EACb,IAAI,CAAC3G,8BACP,CAAC;UAED,IAAI,CAACiH,oBAAoB,EAAE;YACzB,MAAM,IAAInG,KAAK,CAAC,6DAA6D,CAAC;UAChF;UAEA,MAAMoG,2BAAqD,GAAG;YAC5DrD,0BAA0B,EAAE1C,WAAI,CAACc,MAAM,CAAC,IAAI,CAAC9B,qBAAqB,CAAC2D,SAAS,CAAC;YAC7EC,aAAa,EAAEP,YAAY;YAC3BxC,OAAO,EAAEiG,oBAAoB,CAAClF,gBAAgB;YAC9CV,KAAK,EAAE4F,oBAAoB,CAAC5F;UAC9B,CAAC;UACDmF,WAAW,GAAG,IAAI,CAACjG,QAAQ,CAAC8F,aAAa,EAAEa,2BAAkC,CAAC;UAC9E;QACF;MACA,KAAKlI,sBAAsB,CAACK,4BAA4B;QAAE;UACxD,MAAMoH,WAAW,GAAGL,aAAiD;UACrE,IACE,CAACK,WAAW,IACZ,CAACU,KAAK,CAACC,OAAO,CAACX,WAAW,CAACY,YAAY,CAAC,IACxC,CAACZ,WAAW,CAACY,YAAY,CAACC,KAAK,CAAEC,CAAM,IAAK,OAAOA,CAAC,KAAK,QAAQ,CAAC,EAClE;YACA,MAAM,IAAIzG,KAAK,CACZ,6EAA4EqF,aAAc,EAC7F,CAAC;UACH;UAEA,MAAMQ,aAAa,GAAG;YACpB3D,OAAO,EAAE,IAAI,CAAClD,YAAa;YAC3BuH,YAAY,EAAEZ,WAAW,CAACY;UAC5B,CAAC;UACD,MAAMT,aAAa,GAAG,IAAI,CAAC7F,cAAc,CACvC4F,aAAa,EACb,IAAI,CAAC3G,8BACP,CAAC;UACD,IAAI,CAAC4G,aAAa,EAAE;YAClB,MAAM,IAAI9F,KAAK,CAAE,kDAAiDqF,aAAc,GAAE,CAAC;UACrF;UAEA,MAAMqB,uBAAyD,GAAG;YAChE3D,0BAA0B,EAAE1C,WAAI,CAACc,MAAM,CAAC,IAAI,CAAC9B,qBAAqB,CAAC2D,SAAS,CAAC;YAC7EC,aAAa,EAAEP,YAAY;YAC3BJ,OAAO,EAAE,IAAI,CAACvD,cAAc;YAC5BmB,OAAO,EAAE4F,aAAa,CAAC7E,gBAAgB;YACvCV,KAAK,EAAEuF,aAAa,CAACvF;UACvB,CAAC;UACDmF,WAAW,GAAG,IAAI,CAACjG,QAAQ,CAAC8F,aAAa,EAAEmB,uBAA8B,CAAC;UAC1E;QACF;MACA;QAAS;UACP,MAAM,IAAI1G,KAAK,CAAE,8CAA6CqF,aAAc,EAAC,CAAC;QAChF;IACF;IAEA,OAAO,IAAIlC,OAAO,CAAI,CAACC,OAAO,EAAEC,MAAM,KAAK;MACzC,IAAIC,YAA2C,GAAG,IAAI;MACtD,MAAMC,cAAc,GAAG,MAAOC,KAAsB,IAAK;QACvD,IAAIF,YAAY,EAAE;UAChBA,YAAY,CAACG,MAAM,CAAC,CAAC;QACvB;QACA,MAAMC,OAAO,GAAGF,KAAK,CAACN,GAAG;QACzB,IAAIQ,OAAO,CAACC,UAAU,CAACjB,YAAY,CAAC,EAAE;UACpC,MAAMkB,iBAAiB,GAAG,IAAI/D,eAAe,CAC3C6D,OAAO,CAACG,SAAS,CAACH,OAAO,CAACI,OAAO,CAAC,GAAG,CAAC,GAAG,CAAC,CAC5C,CAAC;UACD,MAAMC,SAAS,GAAGH,iBAAiB,CAACI,GAAG,CAAC,WAAW,CAAC;UACpD,MAAMC,YAAY,GAAGL,iBAAiB,CAACI,GAAG,CAAC,cAAc,CAAC;UAC1D,IAAID,SAAS,EAAE;YACb,OAAOV,MAAM,CACX,IAAIrD,KAAK,CACN,WAAUqF,aAAc,YACvBpB,YAAY,IAAI,eACjB,WAAUF,SAAU,GACvB,CACF,CAAC;UACH;UACA,MAAM4C,aAAa,GAAG/C,iBAAiB,CAACI,GAAG,CAAC,OAAO,CAAC;UACpD,MAAM4C,YAAY,GAAGhD,iBAAiB,CAACI,GAAG,CAAC,MAAM,CAAC;UAClD,IAAI,CAAC2C,aAAa,IAAI,CAACC,YAAY,EAAE;YACnC,OAAOvD,MAAM,CACX,IAAIrD,KAAK,CAAE,WAAUqF,aAAc,6CAA4C,CACjF,CAAC;UACH;UACA,MAAMwB,eAAe,GAAG,IAAI,CAACxF,cAAc,CACzCuF,YAAY,EACZD,aAAa,EACb,IAAI,CAACzH,8BACP,CAAC;UACD,IAAI,CAAC2H,eAAe,EAAE;YACpB,OAAOxD,MAAM,CACX,IAAIrD,KAAK,CACN,WAAUqF,aAAc,yDAC3B,CACF,CAAC;UACH;UACAjC,OAAO,CAACyD,eAAoB,CAAC;QAC/B,CAAC,MAAM;UACLxD,MAAM,CAAC,IAAIrD,KAAK,CAAE,WAAUqF,aAAc,4BAA2B,CAAC,CAAC;QACzE;MACF,CAAC;MACD/B,YAAY,GAAGiB,oBAAO,CAACC,gBAAgB,CAAC,KAAK,EAAEjB,cAAc,CAAC;MAC9DgB,oBAAO,CAACE,OAAO,CAACiB,WAAW,CAAC,CAAChB,KAAK,CAACC,GAAG,IAAI;QACxC,IAAIrB,YAAY,EAAE;UAChBA,YAAY,CAACG,MAAM,CAAC,CAAC;QACvB;QACAJ,MAAM,CACJ,IAAIrD,KAAK,CAAE,8BAA6BqF,aAAc,KAAIV,GAAG,CAACC,OAAQ,oBAAmB,CAC3F,CAAC;MACH,CAAC,CAAC;IACJ,CAAC,CAAC;EACJ;AACF;AAACzG,OAAA,CAAAU,eAAA,GAAAA,eAAA"}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"names":[],"sourceRoot":"../../src","sources":["types.ts"],"mappings":""}
|
|
@@ -0,0 +1,238 @@
|
|
|
1
|
+
import { WalletConnector, solana, solanaDevnet, solanaTestnet } from '@reown/appkit-common-react-native';
|
|
2
|
+
import nacl from 'tweetnacl';
|
|
3
|
+
import bs58 from 'bs58';
|
|
4
|
+
import { PhantomProvider, SOLANA_SIGNING_METHODS } from '../providers/PhantomProvider';
|
|
5
|
+
const SOLANA_CLUSTER_TO_CHAIN_ID_PART = {
|
|
6
|
+
'mainnet-beta': solana.id,
|
|
7
|
+
'testnet': solanaTestnet.id,
|
|
8
|
+
'devnet': solanaDevnet.id
|
|
9
|
+
};
|
|
10
|
+
const PHANTOM_CONNECTOR_STORAGE_KEY = '@appkit/phantom-connector-data';
|
|
11
|
+
const DAPP_KEYPAIR_STORAGE_KEY = '@appkit/phantom-dapp-secret-key';
|
|
12
|
+
export class PhantomConnector extends WalletConnector {
|
|
13
|
+
currentCaipNetworkId = null;
|
|
14
|
+
static SUPPORTED_NAMESPACE = 'solana';
|
|
15
|
+
constructor(config) {
|
|
16
|
+
super({
|
|
17
|
+
type: 'phantom'
|
|
18
|
+
});
|
|
19
|
+
this.config = config;
|
|
20
|
+
}
|
|
21
|
+
async init(ops) {
|
|
22
|
+
super.init(ops);
|
|
23
|
+
this.storage = ops.storage;
|
|
24
|
+
await this.initializeKeyPair();
|
|
25
|
+
const appScheme = ops.metadata.redirect?.universal;
|
|
26
|
+
if (!appScheme) {
|
|
27
|
+
throw new Error('Phantom Connector: No universal link found in metadata. Please add redirect.universal to the metadata.');
|
|
28
|
+
}
|
|
29
|
+
const providerConfig = {
|
|
30
|
+
appScheme,
|
|
31
|
+
dappUrl: ops.metadata.url,
|
|
32
|
+
storage: ops.storage,
|
|
33
|
+
dappEncryptionKeyPair: this.dappEncryptionKeyPair
|
|
34
|
+
};
|
|
35
|
+
this.provider = new PhantomProvider(providerConfig);
|
|
36
|
+
this.restoreSession();
|
|
37
|
+
}
|
|
38
|
+
async initializeKeyPair() {
|
|
39
|
+
try {
|
|
40
|
+
const secretKeyB58 = await this.getStorage().getItem(DAPP_KEYPAIR_STORAGE_KEY);
|
|
41
|
+
if (secretKeyB58) {
|
|
42
|
+
const secretKey = bs58.decode(secretKeyB58);
|
|
43
|
+
this.dappEncryptionKeyPair = nacl.box.keyPair.fromSecretKey(secretKey);
|
|
44
|
+
} else {
|
|
45
|
+
const newKeyPair = nacl.box.keyPair();
|
|
46
|
+
this.dappEncryptionKeyPair = newKeyPair;
|
|
47
|
+
await this.getStorage().setItem(DAPP_KEYPAIR_STORAGE_KEY, bs58.encode(newKeyPair.secretKey));
|
|
48
|
+
}
|
|
49
|
+
} catch (error) {
|
|
50
|
+
// disconnect and clear session
|
|
51
|
+
await this.disconnect();
|
|
52
|
+
throw error;
|
|
53
|
+
}
|
|
54
|
+
}
|
|
55
|
+
async connect(opts) {
|
|
56
|
+
if (this.isConnected()) {
|
|
57
|
+
return this.namespaces;
|
|
58
|
+
}
|
|
59
|
+
const defaultChain = opts?.defaultChain?.split(':')?.[0] === 'solana' ? opts?.defaultChain?.split(':')[1] : opts?.namespaces?.['solana']?.chains?.[0]?.split(':')[1];
|
|
60
|
+
const requestedCluster = this.config.cluster ?? Object.keys(SOLANA_CLUSTER_TO_CHAIN_ID_PART).find(key => SOLANA_CLUSTER_TO_CHAIN_ID_PART[key] === defaultChain);
|
|
61
|
+
try {
|
|
62
|
+
const connectResult = await this.getProvider().connect({
|
|
63
|
+
cluster: requestedCluster
|
|
64
|
+
});
|
|
65
|
+
const solanaChainIdPart = SOLANA_CLUSTER_TO_CHAIN_ID_PART[connectResult.cluster];
|
|
66
|
+
if (!solanaChainIdPart) {
|
|
67
|
+
throw new Error(`Phantom Connect: Internal - Unknown cluster mapping for ${connectResult.cluster}`);
|
|
68
|
+
}
|
|
69
|
+
this.currentCaipNetworkId = `solana:${solanaChainIdPart}`;
|
|
70
|
+
this.wallet = {
|
|
71
|
+
name: 'Phantom Wallet',
|
|
72
|
+
id: 'phantom-wallet'
|
|
73
|
+
};
|
|
74
|
+
const userPublicKey = this.getProvider().getUserPublicKey();
|
|
75
|
+
if (!userPublicKey) {
|
|
76
|
+
throw new Error('Phantom Connect: Provider failed to return a user public key.');
|
|
77
|
+
}
|
|
78
|
+
const caipAddress = `${this.currentCaipNetworkId}:${userPublicKey}`;
|
|
79
|
+
this.namespaces = {
|
|
80
|
+
[PhantomConnector.SUPPORTED_NAMESPACE]: {
|
|
81
|
+
accounts: [caipAddress],
|
|
82
|
+
methods: Object.values(SOLANA_SIGNING_METHODS),
|
|
83
|
+
events: [],
|
|
84
|
+
chains: [this.currentCaipNetworkId]
|
|
85
|
+
}
|
|
86
|
+
};
|
|
87
|
+
await this.saveSession(); // Save connector-specific session on successful connect
|
|
88
|
+
|
|
89
|
+
return this.namespaces;
|
|
90
|
+
} catch (error) {
|
|
91
|
+
this.clearSession();
|
|
92
|
+
throw error;
|
|
93
|
+
}
|
|
94
|
+
}
|
|
95
|
+
async disconnect() {
|
|
96
|
+
if (!this.isConnected()) {
|
|
97
|
+
return Promise.resolve();
|
|
98
|
+
}
|
|
99
|
+
try {
|
|
100
|
+
await this.getProvider().disconnect();
|
|
101
|
+
} catch (error) {
|
|
102
|
+
// console.warn(`PhantomConnector: Error during provider disconnect: ${error.message}. Proceeding with local clear.`);
|
|
103
|
+
}
|
|
104
|
+
await this.clearSession();
|
|
105
|
+
}
|
|
106
|
+
async clearSession() {
|
|
107
|
+
this.namespaces = undefined;
|
|
108
|
+
this.wallet = undefined;
|
|
109
|
+
this.currentCaipNetworkId = null;
|
|
110
|
+
await this.clearSessionStorage();
|
|
111
|
+
}
|
|
112
|
+
getProvider() {
|
|
113
|
+
if (!this.provider) {
|
|
114
|
+
throw new Error('Phantom Connector: Provider not initialized. Call init() first.');
|
|
115
|
+
}
|
|
116
|
+
return this.provider;
|
|
117
|
+
}
|
|
118
|
+
getStorage() {
|
|
119
|
+
if (!this.storage) {
|
|
120
|
+
throw new Error('Phantom Connector: Storage not initialized. Call init() first.');
|
|
121
|
+
}
|
|
122
|
+
return this.storage;
|
|
123
|
+
}
|
|
124
|
+
getNamespaces() {
|
|
125
|
+
if (!this.namespaces) {
|
|
126
|
+
throw new Error('Phantom Connector: Not connected. Call connect() first.');
|
|
127
|
+
}
|
|
128
|
+
return this.namespaces;
|
|
129
|
+
}
|
|
130
|
+
getChainId(namespace) {
|
|
131
|
+
if (namespace === PhantomConnector.SUPPORTED_NAMESPACE) {
|
|
132
|
+
return this.currentCaipNetworkId ?? undefined;
|
|
133
|
+
}
|
|
134
|
+
return undefined;
|
|
135
|
+
}
|
|
136
|
+
getWalletInfo() {
|
|
137
|
+
if (!this.isConnected()) {
|
|
138
|
+
return undefined;
|
|
139
|
+
}
|
|
140
|
+
return this.wallet;
|
|
141
|
+
}
|
|
142
|
+
isConnected() {
|
|
143
|
+
// Rely solely on the provider as the source of truth for connection status.
|
|
144
|
+
return this.getProvider().isConnected() && !!this.getProvider().getUserPublicKey();
|
|
145
|
+
}
|
|
146
|
+
async switchNetwork(network) {
|
|
147
|
+
const targetClusterName = Object.keys(SOLANA_CLUSTER_TO_CHAIN_ID_PART).find(key => SOLANA_CLUSTER_TO_CHAIN_ID_PART[key] === network.id);
|
|
148
|
+
if (!targetClusterName) {
|
|
149
|
+
throw new Error(`Cannot switch to unsupported network ID: ${network.id}`);
|
|
150
|
+
}
|
|
151
|
+
const currentClusterName = Object.keys(SOLANA_CLUSTER_TO_CHAIN_ID_PART).find(key => `solana:${SOLANA_CLUSTER_TO_CHAIN_ID_PART[key]}` === this.currentCaipNetworkId);
|
|
152
|
+
if (targetClusterName === currentClusterName && this.isConnected()) {
|
|
153
|
+
return Promise.resolve();
|
|
154
|
+
}
|
|
155
|
+
|
|
156
|
+
// For deeplink wallets, switching network effectively means re-connecting to the new cluster.
|
|
157
|
+
// We can try to disconnect the current session and then initiate a new connection.
|
|
158
|
+
// console.log(`Attempting to switch network to: ${targetClusterName}`);
|
|
159
|
+
await this.disconnect(); // Clear current session
|
|
160
|
+
|
|
161
|
+
// Create a temporary options object to guide the new connection
|
|
162
|
+
const tempConnectOpts = {
|
|
163
|
+
defaultChain: `solana:${SOLANA_CLUSTER_TO_CHAIN_ID_PART[targetClusterName]}`
|
|
164
|
+
};
|
|
165
|
+
|
|
166
|
+
// Attempt to connect to the new cluster
|
|
167
|
+
// The connect method will use the defaultChain from opts to determine the cluster.
|
|
168
|
+
await this.connect(tempConnectOpts);
|
|
169
|
+
|
|
170
|
+
// Verify if the connection was successful and to the correct new network
|
|
171
|
+
if (!this.isConnected() || this.getChainId(PhantomConnector.SUPPORTED_NAMESPACE) !== tempConnectOpts.defaultChain) {
|
|
172
|
+
throw new Error(`Failed to switch network to ${targetClusterName}. Please try connecting manually.`);
|
|
173
|
+
}
|
|
174
|
+
}
|
|
175
|
+
|
|
176
|
+
// Orchestrates session restoration
|
|
177
|
+
async restoreSession() {
|
|
178
|
+
try {
|
|
179
|
+
const providerSession = await this.getProvider().restoreSession();
|
|
180
|
+
if (!providerSession) {
|
|
181
|
+
return false;
|
|
182
|
+
}
|
|
183
|
+
|
|
184
|
+
// If provider session is restored, try to restore connector data
|
|
185
|
+
const storedConnectorDataJson = await this.getStorage().getItem(PHANTOM_CONNECTOR_STORAGE_KEY);
|
|
186
|
+
if (!storedConnectorDataJson) {
|
|
187
|
+
return false; // Provider session exists but connector data is missing
|
|
188
|
+
}
|
|
189
|
+
|
|
190
|
+
const connectorData = JSON.parse(storedConnectorDataJson);
|
|
191
|
+
this.namespaces = connectorData.namespaces;
|
|
192
|
+
this.wallet = connectorData.wallet;
|
|
193
|
+
this.currentCaipNetworkId = connectorData.currentCaipNetworkId;
|
|
194
|
+
|
|
195
|
+
// await this.initializeKeyPair();
|
|
196
|
+
|
|
197
|
+
// Final validation
|
|
198
|
+
if (this.isConnected()) {
|
|
199
|
+
return true;
|
|
200
|
+
}
|
|
201
|
+
|
|
202
|
+
// If validation fails, something is out of sync. Clear everything.
|
|
203
|
+
await this.disconnect();
|
|
204
|
+
return false;
|
|
205
|
+
} catch (error) {
|
|
206
|
+
// On any error, disconnect to ensure a clean state
|
|
207
|
+
await this.disconnect();
|
|
208
|
+
return false;
|
|
209
|
+
}
|
|
210
|
+
}
|
|
211
|
+
|
|
212
|
+
// Saves only connector-specific data
|
|
213
|
+
async saveSession() {
|
|
214
|
+
if (!this.namespaces || !this.wallet || !this.currentCaipNetworkId) {
|
|
215
|
+
return;
|
|
216
|
+
}
|
|
217
|
+
const connectorData = {
|
|
218
|
+
namespaces: this.namespaces,
|
|
219
|
+
wallet: this.wallet,
|
|
220
|
+
currentCaipNetworkId: this.currentCaipNetworkId
|
|
221
|
+
};
|
|
222
|
+
try {
|
|
223
|
+
await this.getStorage().setItem(PHANTOM_CONNECTOR_STORAGE_KEY, JSON.stringify(connectorData));
|
|
224
|
+
} catch (error) {
|
|
225
|
+
// console.error('PhantomConnector: Failed to save session.', error);
|
|
226
|
+
}
|
|
227
|
+
}
|
|
228
|
+
|
|
229
|
+
// Clears only connector-specific data from storage
|
|
230
|
+
async clearSessionStorage() {
|
|
231
|
+
try {
|
|
232
|
+
await this.getStorage().removeItem(PHANTOM_CONNECTOR_STORAGE_KEY);
|
|
233
|
+
} catch (error) {
|
|
234
|
+
// console.error('PhantomConnector: Failed to clear session from storage.', error);
|
|
235
|
+
}
|
|
236
|
+
}
|
|
237
|
+
}
|
|
238
|
+
//# sourceMappingURL=PhantomConnector.js.map
|