@reown/appkit-solana-react-native 0.0.0-feat-multichain-20250604171123 → 0.0.0-feat-multichain-phantom-20250606195341

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (37) hide show
  1. package/lib/commonjs/connectors/PhantomConnector.js +247 -0
  2. package/lib/commonjs/connectors/PhantomConnector.js.map +1 -0
  3. package/lib/commonjs/helpers.js +9 -0
  4. package/lib/commonjs/helpers.js.map +1 -1
  5. package/lib/commonjs/index.js +7 -0
  6. package/lib/commonjs/index.js.map +1 -1
  7. package/lib/commonjs/providers/PhantomProvider.js +395 -0
  8. package/lib/commonjs/providers/PhantomProvider.js.map +1 -0
  9. package/lib/commonjs/types.js +6 -0
  10. package/lib/commonjs/types.js.map +1 -0
  11. package/lib/module/connectors/PhantomConnector.js +239 -0
  12. package/lib/module/connectors/PhantomConnector.js.map +1 -0
  13. package/lib/module/helpers.js +9 -0
  14. package/lib/module/helpers.js.map +1 -1
  15. package/lib/module/index.js +7 -2
  16. package/lib/module/index.js.map +1 -1
  17. package/lib/module/providers/PhantomProvider.js +387 -0
  18. package/lib/module/providers/PhantomProvider.js.map +1 -0
  19. package/lib/module/types.js +2 -0
  20. package/lib/module/types.js.map +1 -0
  21. package/lib/typescript/connectors/PhantomConnector.d.ts +26 -0
  22. package/lib/typescript/connectors/PhantomConnector.d.ts.map +1 -0
  23. package/lib/typescript/helpers.d.ts +8 -7
  24. package/lib/typescript/helpers.d.ts.map +1 -1
  25. package/lib/typescript/index.d.ts +3 -2
  26. package/lib/typescript/index.d.ts.map +1 -1
  27. package/lib/typescript/providers/PhantomProvider.d.ts +37 -0
  28. package/lib/typescript/providers/PhantomProvider.d.ts.map +1 -0
  29. package/lib/typescript/types.d.ts +96 -0
  30. package/lib/typescript/types.d.ts.map +1 -0
  31. package/package.json +7 -5
  32. package/src/connectors/PhantomConnector.ts +328 -0
  33. package/src/helpers.ts +9 -7
  34. package/src/index.ts +8 -0
  35. package/src/providers/PhantomProvider.ts +534 -0
  36. package/src/types.ts +131 -0
  37. package/src/index.tsx +0 -2
@@ -0,0 +1,395 @@
1
+ "use strict";
2
+
3
+ Object.defineProperty(exports, "__esModule", {
4
+ value: true
5
+ });
6
+ exports.SOLANA_SIGNING_METHODS = exports.PhantomProvider = void 0;
7
+ var _reactNative = require("react-native");
8
+ var _tweetnacl = _interopRequireDefault(require("tweetnacl"));
9
+ var _bs = _interopRequireDefault(require("bs58"));
10
+ var _buffer = require("buffer");
11
+ var _events = _interopRequireDefault(require("events"));
12
+ function _interopRequireDefault(e) { return e && e.__esModule ? e : { default: e }; }
13
+ const PHANTOM_BASE_URL = 'https://phantom.app/ul/v1';
14
+ const PHANTOM_PROVIDER_STORAGE_KEY = '@appkit/phantom-provider-session';
15
+ const SOLANA_SIGNING_METHODS = exports.SOLANA_SIGNING_METHODS = {
16
+ SOLANA_SIGN_TRANSACTION: 'solana_signTransaction',
17
+ SOLANA_SIGN_MESSAGE: 'solana_signMessage',
18
+ SOLANA_SIGN_AND_SEND_TRANSACTION: 'solana_signAndSendTransaction',
19
+ SOLANA_SIGN_ALL_TRANSACTIONS: 'solana_signAllTransactions'
20
+ };
21
+ function isValidSolanaSigningMethod(method) {
22
+ return Object.values(SOLANA_SIGNING_METHODS).includes(method);
23
+ }
24
+ class PhantomProvider extends _events.default {
25
+ currentCluster = 'mainnet-beta';
26
+ sessionToken = null;
27
+ userPublicKey = null;
28
+ phantomEncryptionPublicKeyBs58 = null;
29
+ constructor(config) {
30
+ super();
31
+ this.config = config;
32
+ this.dappEncryptionKeyPair = config.dappEncryptionKeyPair;
33
+ this.storage = config.storage;
34
+ }
35
+ getUserPublicKey() {
36
+ return this.userPublicKey;
37
+ }
38
+ isConnected() {
39
+ return !!this.sessionToken && !!this.userPublicKey && !!this.dappEncryptionKeyPair;
40
+ }
41
+ buildUrl(rpcMethod, params) {
42
+ const query = new URLSearchParams(params).toString();
43
+ return `${PHANTOM_BASE_URL}/${rpcMethod}?${query}`;
44
+ }
45
+ getRpcMethodName(method) {
46
+ switch (method) {
47
+ case SOLANA_SIGNING_METHODS.SOLANA_SIGN_TRANSACTION:
48
+ return 'signTransaction';
49
+ case SOLANA_SIGNING_METHODS.SOLANA_SIGN_AND_SEND_TRANSACTION:
50
+ return 'signAndSendTransaction';
51
+ case SOLANA_SIGNING_METHODS.SOLANA_SIGN_ALL_TRANSACTIONS:
52
+ return 'signAllTransactions';
53
+ case SOLANA_SIGNING_METHODS.SOLANA_SIGN_MESSAGE:
54
+ return 'signMessage';
55
+ default:
56
+ // Should not happen due to type constraints on `method`
57
+ throw new Error(`Unsupported Solana signing method: ${method}`);
58
+ }
59
+ }
60
+ encryptPayload(payload, phantomPublicKeyBs58ToEncryptFor) {
61
+ if (!phantomPublicKeyBs58ToEncryptFor) {
62
+ return null;
63
+ }
64
+ try {
65
+ const phantomPublicKeyBytes = _bs.default.decode(phantomPublicKeyBs58ToEncryptFor);
66
+ const nonce = _tweetnacl.default.randomBytes(_tweetnacl.default.box.nonceLength);
67
+ const payloadBytes = _buffer.Buffer.from(JSON.stringify(payload), 'utf8');
68
+ const encryptedPayload = _tweetnacl.default.box(payloadBytes, nonce, phantomPublicKeyBytes, this.dappEncryptionKeyPair.secretKey);
69
+ return {
70
+ nonce: _bs.default.encode(nonce),
71
+ encryptedPayload: _bs.default.encode(encryptedPayload)
72
+ };
73
+ } catch (error) {
74
+ return null;
75
+ }
76
+ }
77
+ decryptPayload(encryptedDataBs58, nonceBs58, phantomSenderPublicKeyBs58) {
78
+ try {
79
+ const encryptedDataBytes = _bs.default.decode(encryptedDataBs58);
80
+ const nonceBytes = _bs.default.decode(nonceBs58);
81
+ const phantomSenderPublicKeyBytes = _bs.default.decode(phantomSenderPublicKeyBs58);
82
+ const decryptedPayloadBytes = _tweetnacl.default.box.open(encryptedDataBytes, nonceBytes, phantomSenderPublicKeyBytes, this.dappEncryptionKeyPair.secretKey);
83
+ if (!decryptedPayloadBytes) {
84
+ return null;
85
+ }
86
+ return JSON.parse(_buffer.Buffer.from(decryptedPayloadBytes).toString('utf8'));
87
+ } catch (error) {
88
+ return null;
89
+ }
90
+ }
91
+ async restoreSession() {
92
+ try {
93
+ const session = await this.storage.getItem(PHANTOM_PROVIDER_STORAGE_KEY);
94
+ if (session) {
95
+ this.setSession(session);
96
+ return true;
97
+ }
98
+ return false;
99
+ } catch (error) {
100
+ // console.error('PhantomProvider: Failed to restore session.', error);
101
+ await this.clearSessionStorage(); // Clear potentially corrupt data
102
+
103
+ return false;
104
+ }
105
+ }
106
+ async saveSession() {
107
+ if (!this.sessionToken || !this.userPublicKey || !this.phantomEncryptionPublicKeyBs58) {
108
+ return; // Cannot save incomplete session
109
+ }
110
+
111
+ const session = {
112
+ sessionToken: this.sessionToken,
113
+ userPublicKey: this.userPublicKey,
114
+ phantomEncryptionPublicKeyBs58: this.phantomEncryptionPublicKeyBs58,
115
+ cluster: this.currentCluster
116
+ };
117
+ try {
118
+ await this.storage.setItem(PHANTOM_PROVIDER_STORAGE_KEY, JSON.stringify(session));
119
+ } catch (error) {
120
+ // console.error('PhantomProvider: Failed to save session.', error);
121
+ }
122
+ }
123
+ async clearSessionStorage() {
124
+ try {
125
+ await this.storage.removeItem(PHANTOM_PROVIDER_STORAGE_KEY);
126
+ } catch (error) {
127
+ // console.error('PhantomProvider: Failed to clear session storage.', error);
128
+ }
129
+ }
130
+ async connect(params) {
131
+ const cluster = params?.cluster ?? 'mainnet-beta';
132
+ this.currentCluster = cluster;
133
+ const redirectLink = `${this.config.appScheme}://phantom_connect`;
134
+ const connectDeeplinkParams = {
135
+ app_url: this.config.dappUrl,
136
+ dapp_encryption_public_key: _bs.default.encode(this.dappEncryptionKeyPair.publicKey),
137
+ redirect_link: redirectLink,
138
+ cluster
139
+ };
140
+ const url = this.buildUrl('connect', connectDeeplinkParams);
141
+ return new Promise((resolve, reject) => {
142
+ let subscription = null;
143
+ const handleDeepLink = async event => {
144
+ if (subscription) {
145
+ subscription.remove();
146
+ }
147
+ const fullUrl = event.url;
148
+ if (fullUrl.startsWith(redirectLink)) {
149
+ const responseUrlParams = new URLSearchParams(fullUrl.substring(fullUrl.indexOf('?') + 1));
150
+ const errorCode = responseUrlParams.get('errorCode');
151
+ const errorMessage = responseUrlParams.get('errorMessage');
152
+ if (errorCode) {
153
+ return reject(new Error(`Phantom Connection Failed: ${errorMessage || 'Unknown error'} (Code: ${errorCode})`));
154
+ }
155
+ const responsePayload = {
156
+ phantom_encryption_public_key: responseUrlParams.get('phantom_encryption_public_key'),
157
+ nonce: responseUrlParams.get('nonce'),
158
+ data: responseUrlParams.get('data')
159
+ };
160
+ if (!responsePayload.phantom_encryption_public_key || !responsePayload.nonce || !responsePayload.data) {
161
+ return reject(new Error('Phantom Connect: Invalid response - missing parameters.'));
162
+ }
163
+ const decryptedData = this.decryptPayload(responsePayload.data, responsePayload.nonce, responsePayload.phantom_encryption_public_key);
164
+ if (!decryptedData || !decryptedData.public_key || !decryptedData.session) {
165
+ return reject(new Error('Phantom Connect: Failed to decrypt or invalid decrypted data.'));
166
+ }
167
+ this.userPublicKey = decryptedData.public_key;
168
+ this.sessionToken = decryptedData.session;
169
+ this.phantomEncryptionPublicKeyBs58 = responsePayload.phantom_encryption_public_key;
170
+
171
+ // Save session on successful connect
172
+ this.saveSession();
173
+ resolve({
174
+ userPublicKey: this.userPublicKey,
175
+ sessionToken: this.sessionToken,
176
+ phantomEncryptionPublicKeyBs58: this.phantomEncryptionPublicKeyBs58,
177
+ cluster
178
+ });
179
+ } else {
180
+ reject(new Error('Phantom Connect: Unexpected redirect URI.'));
181
+ }
182
+ };
183
+ subscription = _reactNative.Linking.addEventListener('url', handleDeepLink);
184
+ _reactNative.Linking.openURL(url).catch(err => {
185
+ if (subscription) {
186
+ subscription.remove();
187
+ }
188
+ reject(new Error(`Failed to open Phantom wallet: ${err.message}. Is it installed?`));
189
+ });
190
+ });
191
+ }
192
+ async disconnect() {
193
+ if (!this.sessionToken || !this.phantomEncryptionPublicKeyBs58) {
194
+ await this.clearSession();
195
+ return Promise.resolve();
196
+ }
197
+ const payloadToEncrypt = {
198
+ session: this.sessionToken
199
+ };
200
+ const encryptedDisconnectPayload = this.encryptPayload(payloadToEncrypt, this.phantomEncryptionPublicKeyBs58);
201
+ if (!encryptedDisconnectPayload) {
202
+ // console.warn('PhantomProvider: Failed to encrypt disconnect payload. Clearing session locally.');
203
+ await this.clearSession();
204
+ return Promise.resolve(); // Or reject, depending on desired strictness
205
+ }
206
+
207
+ const redirectLink = `${this.config.appScheme}://phantom_disconnect`;
208
+ const disconnectDeeplinkParams = {
209
+ dapp_encryption_public_key: _bs.default.encode(this.dappEncryptionKeyPair.publicKey),
210
+ redirect_link: redirectLink,
211
+ payload: encryptedDisconnectPayload.encryptedPayload,
212
+ nonce: encryptedDisconnectPayload.nonce
213
+ };
214
+ const url = this.buildUrl('disconnect', disconnectDeeplinkParams);
215
+ return new Promise((resolve, reject) => {
216
+ let subscription = null;
217
+ const handleDeepLink = event => {
218
+ if (subscription) {
219
+ subscription.remove();
220
+ }
221
+ if (event.url.startsWith(redirectLink)) {
222
+ this.clearSession();
223
+ resolve();
224
+ } else {
225
+ this.clearSession();
226
+ reject(new Error('Phantom Disconnect: Unexpected redirect URI.'));
227
+ }
228
+ };
229
+ subscription = _reactNative.Linking.addEventListener('url', handleDeepLink);
230
+ _reactNative.Linking.openURL(url).catch(err => {
231
+ if (subscription) {
232
+ subscription.remove();
233
+ }
234
+ this.clearSession();
235
+ reject(new Error(`Failed to open Phantom for disconnection: ${err.message}.`));
236
+ });
237
+ });
238
+ }
239
+ async clearSession() {
240
+ this.sessionToken = null;
241
+ this.userPublicKey = null;
242
+ this.phantomEncryptionPublicKeyBs58 = null;
243
+ await this.clearSessionStorage();
244
+ }
245
+ setSession(session) {
246
+ this.sessionToken = session.sessionToken;
247
+ this.userPublicKey = session.userPublicKey;
248
+ this.phantomEncryptionPublicKeyBs58 = session.phantomEncryptionPublicKeyBs58;
249
+ this.currentCluster = session.cluster;
250
+ }
251
+ async request(args, _chainId) {
252
+ if (!isValidSolanaSigningMethod(args.method)) {
253
+ throw new Error(`PhantomProvider: Unsupported method: ${args.method}. Only Solana signing methods are supported.`);
254
+ }
255
+ const signingMethod = args.method;
256
+ const requestParams = args.params;
257
+ if (!this.isConnected() || !this.sessionToken || !this.phantomEncryptionPublicKeyBs58) {
258
+ throw new Error('PhantomProvider: Not connected or session details missing. Cannot process request.');
259
+ }
260
+ const rpcMethodName = this.getRpcMethodName(signingMethod);
261
+ const redirectSuffix = rpcMethodName.toLowerCase();
262
+ const redirectLink = `${this.config.appScheme}://phantom_${redirectSuffix}`;
263
+ let deeplinkUrl = '';
264
+ switch (signingMethod) {
265
+ case SOLANA_SIGNING_METHODS.SOLANA_SIGN_TRANSACTION:
266
+ case SOLANA_SIGNING_METHODS.SOLANA_SIGN_AND_SEND_TRANSACTION:
267
+ {
268
+ const typedParams = requestParams;
269
+ if (!typedParams || typeof typedParams.transaction !== 'string') {
270
+ throw new Error(`Missing or invalid 'transaction' (base58 string) in params for ${signingMethod}`);
271
+ }
272
+ const dataToEncrypt = {
273
+ session: this.sessionToken,
274
+ transaction: typedParams.transaction
275
+ };
276
+ const encryptedData = this.encryptPayload(dataToEncrypt, this.phantomEncryptionPublicKeyBs58);
277
+ if (!encryptedData) {
278
+ throw new Error(`PhantomProvider: Failed to encrypt payload for ${signingMethod}.`);
279
+ }
280
+ const signTxDeeplinkParams = {
281
+ dapp_encryption_public_key: _bs.default.encode(this.dappEncryptionKeyPair.publicKey),
282
+ redirect_link: redirectLink,
283
+ cluster: this.currentCluster,
284
+ payload: encryptedData.encryptedPayload,
285
+ nonce: encryptedData.nonce
286
+ };
287
+ deeplinkUrl = this.buildUrl(rpcMethodName, signTxDeeplinkParams);
288
+ break;
289
+ }
290
+ case SOLANA_SIGNING_METHODS.SOLANA_SIGN_MESSAGE:
291
+ {
292
+ const typedParams = requestParams;
293
+ if (!typedParams || typeof typedParams.message === 'undefined') {
294
+ throw new Error(`Missing 'message' in params for ${signingMethod}`);
295
+ }
296
+ let messageBs58;
297
+ if (typedParams.message instanceof Uint8Array) {
298
+ messageBs58 = _bs.default.encode(typedParams.message);
299
+ } else if (typeof typedParams.message === 'string') {
300
+ try {
301
+ _bs.default.decode(typedParams.message);
302
+ messageBs58 = typedParams.message;
303
+ } catch (e) {
304
+ messageBs58 = _bs.default.encode(_buffer.Buffer.from(typedParams.message));
305
+ }
306
+ } else {
307
+ throw new Error('Invalid message format for signMessage. Expected Uint8Array or string.');
308
+ }
309
+ const dataToEncrypt = {
310
+ message: messageBs58,
311
+ session: this.sessionToken,
312
+ display: typedParams.display || 'utf8'
313
+ };
314
+ const encryptedPayloadData = this.encryptPayload(dataToEncrypt, this.phantomEncryptionPublicKeyBs58);
315
+ if (!encryptedPayloadData) {
316
+ throw new Error('PhantomProvider: Failed to encrypt payload for signMessage.');
317
+ }
318
+ const signMsgDeeplinkQueryPayload = {
319
+ dapp_encryption_public_key: _bs.default.encode(this.dappEncryptionKeyPair.publicKey),
320
+ redirect_link: redirectLink,
321
+ payload: encryptedPayloadData.encryptedPayload,
322
+ nonce: encryptedPayloadData.nonce
323
+ };
324
+ deeplinkUrl = this.buildUrl(rpcMethodName, signMsgDeeplinkQueryPayload);
325
+ break;
326
+ }
327
+ case SOLANA_SIGNING_METHODS.SOLANA_SIGN_ALL_TRANSACTIONS:
328
+ {
329
+ const typedParams = requestParams;
330
+ if (!typedParams || !Array.isArray(typedParams.transactions) || !typedParams.transactions.every(t => typeof t === 'string')) {
331
+ throw new Error(`Missing or invalid 'transactions' (array of base58 strings) in params for ${signingMethod}`);
332
+ }
333
+ const dataToEncrypt = {
334
+ session: this.sessionToken,
335
+ transactions: typedParams.transactions
336
+ };
337
+ const encryptedData = this.encryptPayload(dataToEncrypt, this.phantomEncryptionPublicKeyBs58);
338
+ if (!encryptedData) {
339
+ throw new Error(`PhantomProvider: Failed to encrypt payload for ${signingMethod}.`);
340
+ }
341
+ const signAllTxDeeplinkParams = {
342
+ dapp_encryption_public_key: _bs.default.encode(this.dappEncryptionKeyPair.publicKey),
343
+ redirect_link: redirectLink,
344
+ cluster: this.currentCluster,
345
+ payload: encryptedData.encryptedPayload,
346
+ nonce: encryptedData.nonce
347
+ };
348
+ deeplinkUrl = this.buildUrl(rpcMethodName, signAllTxDeeplinkParams);
349
+ break;
350
+ }
351
+ default:
352
+ {
353
+ throw new Error(`PhantomProvider: Unhandled signing method: ${signingMethod}`);
354
+ }
355
+ }
356
+ return new Promise((resolve, reject) => {
357
+ let subscription = null;
358
+ const handleDeepLink = async event => {
359
+ if (subscription) {
360
+ subscription.remove();
361
+ }
362
+ const fullUrl = event.url;
363
+ if (fullUrl.startsWith(redirectLink)) {
364
+ const responseUrlParams = new URLSearchParams(fullUrl.substring(fullUrl.indexOf('?') + 1));
365
+ const errorCode = responseUrlParams.get('errorCode');
366
+ const errorMessage = responseUrlParams.get('errorMessage');
367
+ if (errorCode) {
368
+ return reject(new Error(`Phantom ${signingMethod} Failed: ${errorMessage || 'Unknown error'} (Code: ${errorCode})`));
369
+ }
370
+ const responseNonce = responseUrlParams.get('nonce');
371
+ const responseData = responseUrlParams.get('data');
372
+ if (!responseNonce || !responseData) {
373
+ return reject(new Error(`Phantom ${signingMethod}: Invalid response - missing nonce or data.`));
374
+ }
375
+ const decryptedResult = this.decryptPayload(responseData, responseNonce, this.phantomEncryptionPublicKeyBs58);
376
+ if (!decryptedResult) {
377
+ return reject(new Error(`Phantom ${signingMethod}: Failed to decrypt response or invalid decrypted data.`));
378
+ }
379
+ resolve(decryptedResult);
380
+ } else {
381
+ reject(new Error(`Phantom ${signingMethod}: Unexpected redirect URI.`));
382
+ }
383
+ };
384
+ subscription = _reactNative.Linking.addEventListener('url', handleDeepLink);
385
+ _reactNative.Linking.openURL(deeplinkUrl).catch(err => {
386
+ if (subscription) {
387
+ subscription.remove();
388
+ }
389
+ reject(new Error(`Failed to open Phantom for ${signingMethod}: ${err.message}. Is it installed?`));
390
+ });
391
+ });
392
+ }
393
+ }
394
+ exports.PhantomProvider = PhantomProvider;
395
+ //# sourceMappingURL=PhantomProvider.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"names":["_reactNative","require","_tweetnacl","_interopRequireDefault","_bs","_buffer","_events","e","__esModule","default","PHANTOM_BASE_URL","PHANTOM_PROVIDER_STORAGE_KEY","SOLANA_SIGNING_METHODS","exports","SOLANA_SIGN_TRANSACTION","SOLANA_SIGN_MESSAGE","SOLANA_SIGN_AND_SEND_TRANSACTION","SOLANA_SIGN_ALL_TRANSACTIONS","isValidSolanaSigningMethod","method","Object","values","includes","PhantomProvider","EventEmitter","currentCluster","sessionToken","userPublicKey","phantomEncryptionPublicKeyBs58","constructor","config","dappEncryptionKeyPair","storage","getUserPublicKey","isConnected","buildUrl","rpcMethod","params","query","URLSearchParams","toString","getRpcMethodName","Error","encryptPayload","payload","phantomPublicKeyBs58ToEncryptFor","phantomPublicKeyBytes","bs58","decode","nonce","nacl","randomBytes","box","nonceLength","payloadBytes","Buffer","from","JSON","stringify","encryptedPayload","secretKey","encode","error","decryptPayload","encryptedDataBs58","nonceBs58","phantomSenderPublicKeyBs58","encryptedDataBytes","nonceBytes","phantomSenderPublicKeyBytes","decryptedPayloadBytes","open","parse","restoreSession","session","getItem","setSession","clearSessionStorage","saveSession","cluster","setItem","removeItem","connect","redirectLink","appScheme","connectDeeplinkParams","app_url","dappUrl","dapp_encryption_public_key","publicKey","redirect_link","url","Promise","resolve","reject","subscription","handleDeepLink","event","remove","fullUrl","startsWith","responseUrlParams","substring","indexOf","errorCode","get","errorMessage","responsePayload","phantom_encryption_public_key","data","decryptedData","public_key","Linking","addEventListener","openURL","catch","err","message","disconnect","clearSession","payloadToEncrypt","encryptedDisconnectPayload","disconnectDeeplinkParams","request","args","_chainId","signingMethod","requestParams","rpcMethodName","redirectSuffix","toLowerCase","deeplinkUrl","typedParams","transaction","dataToEncrypt","encryptedData","signTxDeeplinkParams","messageBs58","Uint8Array","display","encryptedPayloadData","signMsgDeeplinkQueryPayload","Array","isArray","transactions","every","t","signAllTxDeeplinkParams","responseNonce","responseData","decryptedResult"],"sourceRoot":"../../../src","sources":["providers/PhantomProvider.ts"],"mappings":";;;;;;AAAA,IAAAA,YAAA,GAAAC,OAAA;AACA,IAAAC,UAAA,GAAAC,sBAAA,CAAAF,OAAA;AACA,IAAAG,GAAA,GAAAD,sBAAA,CAAAF,OAAA;AACA,IAAAI,OAAA,GAAAJ,OAAA;AAwBA,IAAAK,OAAA,GAAAH,sBAAA,CAAAF,OAAA;AAAkC,SAAAE,uBAAAI,CAAA,WAAAA,CAAA,IAAAA,CAAA,CAAAC,UAAA,GAAAD,CAAA,KAAAE,OAAA,EAAAF,CAAA;AAElC,MAAMG,gBAAgB,GAAG,2BAA2B;AACpD,MAAMC,4BAA4B,GAAG,kCAAkC;AAEhE,MAAMC,sBAAsB,GAAAC,OAAA,CAAAD,sBAAA,GAAG;EACpCE,uBAAuB,EAAE,wBAAwB;EACjDC,mBAAmB,EAAE,oBAAoB;EACzCC,gCAAgC,EAAE,+BAA+B;EACjEC,4BAA4B,EAAE;AAChC,CAAU;AAIV,SAASC,0BAA0BA,CAACC,MAAc,EAAiC;EACjF,OAAOC,MAAM,CAACC,MAAM,CAACT,sBAAsB,CAAC,CAACU,QAAQ,CAACH,MAA6B,CAAC;AACtF;AAEO,MAAMI,eAAe,SAASC,eAAY,CAAqB;EAG5DC,cAAc,GAAmB,cAAc;EAI/CC,YAAY,GAAkB,IAAI;EAClCC,aAAa,GAAkB,IAAI;EACnCC,8BAA8B,GAAkB,IAAI;EAE5DC,WAAWA,CAACC,MAA6B,EAAE;IACzC,KAAK,CAAC,CAAC;IACP,IAAI,CAACA,MAAM,GAAGA,MAAM;IACpB,IAAI,CAACC,qBAAqB,GAAGD,MAAM,CAACC,qBAAqB;IACzD,IAAI,CAACC,OAAO,GAAGF,MAAM,CAACE,OAAO;EAC/B;EAEAC,gBAAgBA,CAAA,EAAkB;IAChC,OAAO,IAAI,CAACN,aAAa;EAC3B;EAEAO,WAAWA,CAAA,EAAY;IACrB,OAAO,CAAC,CAAC,IAAI,CAACR,YAAY,IAAI,CAAC,CAAC,IAAI,CAACC,aAAa,IAAI,CAAC,CAAC,IAAI,CAACI,qBAAqB;EACpF;EAEQI,QAAQA,CAACC,SAA2B,EAAEC,MAA8B,EAAU;IACpF,MAAMC,KAAK,GAAG,IAAIC,eAAe,CAACF,MAAM,CAAC,CAACG,QAAQ,CAAC,CAAC;IAEpD,OAAQ,GAAE9B,gBAAiB,IAAG0B,SAAU,IAAGE,KAAM,EAAC;EACpD;EAEQG,gBAAgBA,CAACtB,MAA2B,EAAoB;IACtE,QAAQA,MAAM;MACZ,KAAKP,sBAAsB,CAACE,uBAAuB;QACjD,OAAO,iBAAiB;MAC1B,KAAKF,sBAAsB,CAACI,gCAAgC;QAC1D,OAAO,wBAAwB;MACjC,KAAKJ,sBAAsB,CAACK,4BAA4B;QACtD,OAAO,qBAAqB;MAC9B,KAAKL,sBAAsB,CAACG,mBAAmB;QAC7C,OAAO,aAAa;MACtB;QACE;QACA,MAAM,IAAI2B,KAAK,CAAE,sCAAqCvB,MAAO,EAAC,CAAC;IACnE;EACF;EAEQwB,cAAcA,CACpBC,OAAgC,EAChCC,gCAAwC,EACY;IACpD,IAAI,CAACA,gCAAgC,EAAE;MACrC,OAAO,IAAI;IACb;IACA,IAAI;MACF,MAAMC,qBAAqB,GAAGC,WAAI,CAACC,MAAM,CAACH,gCAAgC,CAAC;MAC3E,MAAMI,KAAK,GAAGC,kBAAI,CAACC,WAAW,CAACD,kBAAI,CAACE,GAAG,CAACC,WAAW,CAAC;MACpD,MAAMC,YAAY,GAAGC,cAAM,CAACC,IAAI,CAACC,IAAI,CAACC,SAAS,CAACd,OAAO,CAAC,EAAE,MAAM,CAAC;MACjE,MAAMe,gBAAgB,GAAGT,kBAAI,CAACE,GAAG,CAC/BE,YAAY,EACZL,KAAK,EACLH,qBAAqB,EACrB,IAAI,CAACf,qBAAqB,CAAC6B,SAC7B,CAAC;MAED,OAAO;QACLX,KAAK,EAAEF,WAAI,CAACc,MAAM,CAACZ,KAAK,CAAC;QACzBU,gBAAgB,EAAEZ,WAAI,CAACc,MAAM,CAACF,gBAAgB;MAChD,CAAC;IACH,CAAC,CAAC,OAAOG,KAAK,EAAE;MACd,OAAO,IAAI;IACb;EACF;EAEQC,cAAcA,CACpBC,iBAAyB,EACzBC,SAAiB,EACjBC,0BAAkC,EACxB;IACV,IAAI;MACF,MAAMC,kBAAkB,GAAGpB,WAAI,CAACC,MAAM,CAACgB,iBAAiB,CAAC;MACzD,MAAMI,UAAU,GAAGrB,WAAI,CAACC,MAAM,CAACiB,SAAS,CAAC;MACzC,MAAMI,2BAA2B,GAAGtB,WAAI,CAACC,MAAM,CAACkB,0BAA0B,CAAC;MAC3E,MAAMI,qBAAqB,GAAGpB,kBAAI,CAACE,GAAG,CAACmB,IAAI,CACzCJ,kBAAkB,EAClBC,UAAU,EACVC,2BAA2B,EAC3B,IAAI,CAACtC,qBAAqB,CAAC6B,SAC7B,CAAC;MACD,IAAI,CAACU,qBAAqB,EAAE;QAC1B,OAAO,IAAI;MACb;MAEA,OAAOb,IAAI,CAACe,KAAK,CAACjB,cAAM,CAACC,IAAI,CAACc,qBAAqB,CAAC,CAAC9B,QAAQ,CAAC,MAAM,CAAC,CAAC;IACxE,CAAC,CAAC,OAAOsB,KAAK,EAAE;MACd,OAAO,IAAI;IACb;EACF;EAEA,MAAaW,cAAcA,CAAA,EAAqB;IAC9C,IAAI;MACF,MAAMC,OAAO,GAAG,MAAM,IAAI,CAAC1C,OAAO,CAAC2C,OAAO,CAAiBhE,4BAA4B,CAAC;MACxF,IAAI+D,OAAO,EAAE;QACX,IAAI,CAACE,UAAU,CAACF,OAAO,CAAC;QAExB,OAAO,IAAI;MACb;MAEA,OAAO,KAAK;IACd,CAAC,CAAC,OAAOZ,KAAK,EAAE;MACd;MACA,MAAM,IAAI,CAACe,mBAAmB,CAAC,CAAC,CAAC,CAAC;;MAElC,OAAO,KAAK;IACd;EACF;EAEA,MAAcC,WAAWA,CAAA,EAAkB;IACzC,IAAI,CAAC,IAAI,CAACpD,YAAY,IAAI,CAAC,IAAI,CAACC,aAAa,IAAI,CAAC,IAAI,CAACC,8BAA8B,EAAE;MACrF,OAAO,CAAC;IACV;;IACA,MAAM8C,OAAuB,GAAG;MAC9BhD,YAAY,EAAE,IAAI,CAACA,YAAY;MAC/BC,aAAa,EAAE,IAAI,CAACA,aAAa;MACjCC,8BAA8B,EAAE,IAAI,CAACA,8BAA8B;MACnEmD,OAAO,EAAE,IAAI,CAACtD;IAChB,CAAC;IACD,IAAI;MACF,MAAM,IAAI,CAACO,OAAO,CAACgD,OAAO,CAACrE,4BAA4B,EAAE8C,IAAI,CAACC,SAAS,CAACgB,OAAO,CAAC,CAAC;IACnF,CAAC,CAAC,OAAOZ,KAAK,EAAE;MACd;IAAA;EAEJ;EAEA,MAAce,mBAAmBA,CAAA,EAAkB;IACjD,IAAI;MACF,MAAM,IAAI,CAAC7C,OAAO,CAACiD,UAAU,CAACtE,4BAA4B,CAAC;IAC7D,CAAC,CAAC,OAAOmD,KAAK,EAAE;MACd;IAAA;EAEJ;EAEA,MAAaoB,OAAOA,CAA2B7C,MAE9C,EAAc;IACb,MAAM0C,OAAO,GAAG1C,MAAM,EAAE0C,OAAO,IAAI,cAAc;IACjD,IAAI,CAACtD,cAAc,GAAGsD,OAAO;IAC7B,MAAMI,YAAY,GAAI,GAAE,IAAI,CAACrD,MAAM,CAACsD,SAAU,oBAAmB;IACjE,MAAMC,qBAA2C,GAAG;MAClDC,OAAO,EAAE,IAAI,CAACxD,MAAM,CAACyD,OAAO;MAC5BC,0BAA0B,EAAEzC,WAAI,CAACc,MAAM,CAAC,IAAI,CAAC9B,qBAAqB,CAAC0D,SAAS,CAAC;MAC7EC,aAAa,EAAEP,YAAY;MAC3BJ;IACF,CAAC;IACD,MAAMY,GAAG,GAAG,IAAI,CAACxD,QAAQ,CAAC,SAAS,EAAEkD,qBAA4B,CAAC;IAElE,OAAO,IAAIO,OAAO,CAAuB,CAACC,OAAO,EAAEC,MAAM,KAAK;MAC5D,IAAIC,YAA2C,GAAG,IAAI;MACtD,MAAMC,cAAc,GAAG,MAAOC,KAAsB,IAAK;QACvD,IAAIF,YAAY,EAAE;UAChBA,YAAY,CAACG,MAAM,CAAC,CAAC;QACvB;QACA,MAAMC,OAAO,GAAGF,KAAK,CAACN,GAAG;QACzB,IAAIQ,OAAO,CAACC,UAAU,CAACjB,YAAY,CAAC,EAAE;UACpC,MAAMkB,iBAAiB,GAAG,IAAI9D,eAAe,CAC3C4D,OAAO,CAACG,SAAS,CAACH,OAAO,CAACI,OAAO,CAAC,GAAG,CAAC,GAAG,CAAC,CAC5C,CAAC;UACD,MAAMC,SAAS,GAAGH,iBAAiB,CAACI,GAAG,CAAC,WAAW,CAAC;UACpD,MAAMC,YAAY,GAAGL,iBAAiB,CAACI,GAAG,CAAC,cAAc,CAAC;UAC1D,IAAID,SAAS,EAAE;YACb,OAAOV,MAAM,CACX,IAAIpD,KAAK,CACN,8BAA6BgE,YAAY,IAAI,eAAgB,WAAUF,SAAU,GACpF,CACF,CAAC;UACH;UACA,MAAMG,eAAwC,GAAG;YAC/CC,6BAA6B,EAAEP,iBAAiB,CAACI,GAAG,CAAC,+BAA+B,CAAE;YACtFxD,KAAK,EAAEoD,iBAAiB,CAACI,GAAG,CAAC,OAAO,CAAE;YACtCI,IAAI,EAAER,iBAAiB,CAACI,GAAG,CAAC,MAAM;UACpC,CAAC;UACD,IACE,CAACE,eAAe,CAACC,6BAA6B,IAC9C,CAACD,eAAe,CAAC1D,KAAK,IACtB,CAAC0D,eAAe,CAACE,IAAI,EACrB;YACA,OAAOf,MAAM,CAAC,IAAIpD,KAAK,CAAC,yDAAyD,CAAC,CAAC;UACrF;UACA,MAAMoE,aAAa,GAAG,IAAI,CAAC/C,cAAc,CACvC4C,eAAe,CAACE,IAAI,EACpBF,eAAe,CAAC1D,KAAK,EACrB0D,eAAe,CAACC,6BAClB,CAAC;UACD,IAAI,CAACE,aAAa,IAAI,CAACA,aAAa,CAACC,UAAU,IAAI,CAACD,aAAa,CAACpC,OAAO,EAAE;YACzE,OAAOoB,MAAM,CACX,IAAIpD,KAAK,CAAC,+DAA+D,CAC3E,CAAC;UACH;UACA,IAAI,CAACf,aAAa,GAAGmF,aAAa,CAACC,UAAU;UAC7C,IAAI,CAACrF,YAAY,GAAGoF,aAAa,CAACpC,OAAO;UACzC,IAAI,CAAC9C,8BAA8B,GAAG+E,eAAe,CAACC,6BAA6B;;UAEnF;UACA,IAAI,CAAC9B,WAAW,CAAC,CAAC;UAElBe,OAAO,CAAC;YACNlE,aAAa,EAAE,IAAI,CAACA,aAAa;YACjCD,YAAY,EAAE,IAAI,CAACA,YAAY;YAC/BE,8BAA8B,EAAE,IAAI,CAACA,8BAA8B;YACnEmD;UACF,CAAC,CAAC;QACJ,CAAC,MAAM;UACLe,MAAM,CAAC,IAAIpD,KAAK,CAAC,2CAA2C,CAAC,CAAC;QAChE;MACF,CAAC;MACDqD,YAAY,GAAGiB,oBAAO,CAACC,gBAAgB,CAAC,KAAK,EAAEjB,cAAc,CAAC;MAC9DgB,oBAAO,CAACE,OAAO,CAACvB,GAAG,CAAC,CAACwB,KAAK,CAACC,GAAG,IAAI;QAChC,IAAIrB,YAAY,EAAE;UAChBA,YAAY,CAACG,MAAM,CAAC,CAAC;QACvB;QACAJ,MAAM,CAAC,IAAIpD,KAAK,CAAE,kCAAiC0E,GAAG,CAACC,OAAQ,oBAAmB,CAAC,CAAC;MACtF,CAAC,CAAC;IACJ,CAAC,CAAC;EACJ;EAEA,MAAaC,UAAUA,CAAA,EAAkB;IACvC,IAAI,CAAC,IAAI,CAAC5F,YAAY,IAAI,CAAC,IAAI,CAACE,8BAA8B,EAAE;MAC9D,MAAM,IAAI,CAAC2F,YAAY,CAAC,CAAC;MAEzB,OAAO3B,OAAO,CAACC,OAAO,CAAC,CAAC;IAC1B;IAEA,MAAM2B,gBAAgB,GAAG;MAAE9C,OAAO,EAAE,IAAI,CAAChD;IAAa,CAAC;IACvD,MAAM+F,0BAA0B,GAAG,IAAI,CAAC9E,cAAc,CACpD6E,gBAAgB,EAChB,IAAI,CAAC5F,8BACP,CAAC;IAED,IAAI,CAAC6F,0BAA0B,EAAE;MAC/B;MACA,MAAM,IAAI,CAACF,YAAY,CAAC,CAAC;MAEzB,OAAO3B,OAAO,CAACC,OAAO,CAAC,CAAC,CAAC,CAAC;IAC5B;;IAEA,MAAMV,YAAY,GAAI,GAAE,IAAI,CAACrD,MAAM,CAACsD,SAAU,uBAAsB;IACpE,MAAMsC,wBAAiD,GAAG;MACxDlC,0BAA0B,EAAEzC,WAAI,CAACc,MAAM,CAAC,IAAI,CAAC9B,qBAAqB,CAAC0D,SAAS,CAAC;MAC7EC,aAAa,EAAEP,YAAY;MAC3BvC,OAAO,EAAE6E,0BAA0B,CAAC9D,gBAAgB;MACpDV,KAAK,EAAEwE,0BAA0B,CAACxE;IACpC,CAAC;IACD,MAAM0C,GAAG,GAAG,IAAI,CAACxD,QAAQ,CAAC,YAAY,EAAEuF,wBAA+B,CAAC;IAExE,OAAO,IAAI9B,OAAO,CAAO,CAACC,OAAO,EAAEC,MAAM,KAAK;MAC5C,IAAIC,YAA2C,GAAG,IAAI;MACtD,MAAMC,cAAc,GAAIC,KAAsB,IAAK;QACjD,IAAIF,YAAY,EAAE;UAChBA,YAAY,CAACG,MAAM,CAAC,CAAC;QACvB;QACA,IAAID,KAAK,CAACN,GAAG,CAACS,UAAU,CAACjB,YAAY,CAAC,EAAE;UACtC,IAAI,CAACoC,YAAY,CAAC,CAAC;UACnB1B,OAAO,CAAC,CAAC;QACX,CAAC,MAAM;UACL,IAAI,CAAC0B,YAAY,CAAC,CAAC;UACnBzB,MAAM,CAAC,IAAIpD,KAAK,CAAC,8CAA8C,CAAC,CAAC;QACnE;MACF,CAAC;MACDqD,YAAY,GAAGiB,oBAAO,CAACC,gBAAgB,CAAC,KAAK,EAAEjB,cAAc,CAAC;MAC9DgB,oBAAO,CAACE,OAAO,CAACvB,GAAG,CAAC,CAACwB,KAAK,CAACC,GAAG,IAAI;QAChC,IAAIrB,YAAY,EAAE;UAChBA,YAAY,CAACG,MAAM,CAAC,CAAC;QACvB;QACA,IAAI,CAACqB,YAAY,CAAC,CAAC;QACnBzB,MAAM,CAAC,IAAIpD,KAAK,CAAE,6CAA4C0E,GAAG,CAACC,OAAQ,GAAE,CAAC,CAAC;MAChF,CAAC,CAAC;IACJ,CAAC,CAAC;EACJ;EAEA,MAAaE,YAAYA,CAAA,EAAkB;IACzC,IAAI,CAAC7F,YAAY,GAAG,IAAI;IACxB,IAAI,CAACC,aAAa,GAAG,IAAI;IACzB,IAAI,CAACC,8BAA8B,GAAG,IAAI;IAC1C,MAAM,IAAI,CAACiD,mBAAmB,CAAC,CAAC;EAClC;EAEOD,UAAUA,CAACF,OAAuB,EAAQ;IAC/C,IAAI,CAAChD,YAAY,GAAGgD,OAAO,CAAChD,YAAY;IACxC,IAAI,CAACC,aAAa,GAAG+C,OAAO,CAAC/C,aAAa;IAC1C,IAAI,CAACC,8BAA8B,GAAG8C,OAAO,CAAC9C,8BAA8B;IAC5E,IAAI,CAACH,cAAc,GAAGiD,OAAO,CAACK,OAAO;EACvC;EAEA,MAAa4C,OAAOA,CAAIC,IAAsB,EAAEC,QAAwB,EAAc;IACpF,IAAI,CAAC3G,0BAA0B,CAAC0G,IAAI,CAACzG,MAAM,CAAC,EAAE;MAC5C,MAAM,IAAIuB,KAAK,CACZ,wCAAuCkF,IAAI,CAACzG,MAAO,8CACtD,CAAC;IACH;IACA,MAAM2G,aAAa,GAAGF,IAAI,CAACzG,MAA6B;IACxD,MAAM4G,aAAa,GAAGH,IAAI,CAACvF,MAAa;IAExC,IAAI,CAAC,IAAI,CAACH,WAAW,CAAC,CAAC,IAAI,CAAC,IAAI,CAACR,YAAY,IAAI,CAAC,IAAI,CAACE,8BAA8B,EAAE;MACrF,MAAM,IAAIc,KAAK,CACb,oFACF,CAAC;IACH;IAEA,MAAMsF,aAAa,GAAG,IAAI,CAACvF,gBAAgB,CAACqF,aAAa,CAAC;IAC1D,MAAMG,cAAc,GAAGD,aAAa,CAACE,WAAW,CAAC,CAAC;IAClD,MAAM/C,YAAY,GAAI,GAAE,IAAI,CAACrD,MAAM,CAACsD,SAAU,cAAa6C,cAAe,EAAC;IAC3E,IAAIE,WAAW,GAAG,EAAE;IAEpB,QAAQL,aAAa;MACnB,KAAKlH,sBAAsB,CAACE,uBAAuB;MACnD,KAAKF,sBAAsB,CAACI,gCAAgC;QAAE;UAC5D,MAAMoH,WAAW,GAAGL,aAA6C;UACjE,IAAI,CAACK,WAAW,IAAI,OAAOA,WAAW,CAACC,WAAW,KAAK,QAAQ,EAAE;YAC/D,MAAM,IAAI3F,KAAK,CACZ,kEAAiEoF,aAAc,EAClF,CAAC;UACH;UAEA,MAAMQ,aAAa,GAAG;YACpB5D,OAAO,EAAE,IAAI,CAAChD,YAAa;YAC3B2G,WAAW,EAAED,WAAW,CAACC;UAC3B,CAAC;UACD,MAAME,aAAa,GAAG,IAAI,CAAC5F,cAAc,CACvC2F,aAAa,EACb,IAAI,CAAC1G,8BACP,CAAC;UACD,IAAI,CAAC2G,aAAa,EAAE;YAClB,MAAM,IAAI7F,KAAK,CAAE,kDAAiDoF,aAAc,GAAE,CAAC;UACrF;UAEA,MAAMU,oBAAkD,GAAG;YACzDhD,0BAA0B,EAAEzC,WAAI,CAACc,MAAM,CAAC,IAAI,CAAC9B,qBAAqB,CAAC0D,SAAS,CAAC;YAC7EC,aAAa,EAAEP,YAAY;YAC3BJ,OAAO,EAAE,IAAI,CAACtD,cAAc;YAC5BmB,OAAO,EAAE2F,aAAa,CAAC5E,gBAAgB;YACvCV,KAAK,EAAEsF,aAAa,CAACtF;UACvB,CAAC;UACDkF,WAAW,GAAG,IAAI,CAAChG,QAAQ,CAAC6F,aAAa,EAAEQ,oBAA2B,CAAC;UACvE;QACF;MACA,KAAK5H,sBAAsB,CAACG,mBAAmB;QAAE;UAC/C,MAAMqH,WAAW,GAAGL,aAAyC;UAC7D,IAAI,CAACK,WAAW,IAAI,OAAOA,WAAW,CAACf,OAAO,KAAK,WAAW,EAAE;YAC9D,MAAM,IAAI3E,KAAK,CAAE,mCAAkCoF,aAAc,EAAC,CAAC;UACrE;UAEA,IAAIW,WAAmB;UACvB,IAAIL,WAAW,CAACf,OAAO,YAAYqB,UAAU,EAAE;YAC7CD,WAAW,GAAG1F,WAAI,CAACc,MAAM,CAACuE,WAAW,CAACf,OAAO,CAAC;UAChD,CAAC,MAAM,IAAI,OAAOe,WAAW,CAACf,OAAO,KAAK,QAAQ,EAAE;YAClD,IAAI;cACFtE,WAAI,CAACC,MAAM,CAACoF,WAAW,CAACf,OAAO,CAAC;cAChCoB,WAAW,GAAGL,WAAW,CAACf,OAAO;YACnC,CAAC,CAAC,OAAO9G,CAAC,EAAE;cACVkI,WAAW,GAAG1F,WAAI,CAACc,MAAM,CAACN,cAAM,CAACC,IAAI,CAAC4E,WAAW,CAACf,OAAO,CAAC,CAAC;YAC7D;UACF,CAAC,MAAM;YACL,MAAM,IAAI3E,KAAK,CAAC,wEAAwE,CAAC;UAC3F;UAEA,MAAM4F,aAAa,GAAG;YACpBjB,OAAO,EAAEoB,WAAW;YACpB/D,OAAO,EAAE,IAAI,CAAChD,YAAa;YAC3BiH,OAAO,EAAEP,WAAW,CAACO,OAAO,IAAI;UAClC,CAAC;UAED,MAAMC,oBAAoB,GAAG,IAAI,CAACjG,cAAc,CAC9C2F,aAAa,EACb,IAAI,CAAC1G,8BACP,CAAC;UAED,IAAI,CAACgH,oBAAoB,EAAE;YACzB,MAAM,IAAIlG,KAAK,CAAC,6DAA6D,CAAC;UAChF;UAEA,MAAMmG,2BAAqD,GAAG;YAC5DrD,0BAA0B,EAAEzC,WAAI,CAACc,MAAM,CAAC,IAAI,CAAC9B,qBAAqB,CAAC0D,SAAS,CAAC;YAC7EC,aAAa,EAAEP,YAAY;YAC3BvC,OAAO,EAAEgG,oBAAoB,CAACjF,gBAAgB;YAC9CV,KAAK,EAAE2F,oBAAoB,CAAC3F;UAC9B,CAAC;UACDkF,WAAW,GAAG,IAAI,CAAChG,QAAQ,CAAC6F,aAAa,EAAEa,2BAAkC,CAAC;UAC9E;QACF;MACA,KAAKjI,sBAAsB,CAACK,4BAA4B;QAAE;UACxD,MAAMmH,WAAW,GAAGL,aAAiD;UACrE,IACE,CAACK,WAAW,IACZ,CAACU,KAAK,CAACC,OAAO,CAACX,WAAW,CAACY,YAAY,CAAC,IACxC,CAACZ,WAAW,CAACY,YAAY,CAACC,KAAK,CAAEC,CAAM,IAAK,OAAOA,CAAC,KAAK,QAAQ,CAAC,EAClE;YACA,MAAM,IAAIxG,KAAK,CACZ,6EAA4EoF,aAAc,EAC7F,CAAC;UACH;UAEA,MAAMQ,aAAa,GAAG;YACpB5D,OAAO,EAAE,IAAI,CAAChD,YAAa;YAC3BsH,YAAY,EAAEZ,WAAW,CAACY;UAC5B,CAAC;UACD,MAAMT,aAAa,GAAG,IAAI,CAAC5F,cAAc,CACvC2F,aAAa,EACb,IAAI,CAAC1G,8BACP,CAAC;UACD,IAAI,CAAC2G,aAAa,EAAE;YAClB,MAAM,IAAI7F,KAAK,CAAE,kDAAiDoF,aAAc,GAAE,CAAC;UACrF;UAEA,MAAMqB,uBAAyD,GAAG;YAChE3D,0BAA0B,EAAEzC,WAAI,CAACc,MAAM,CAAC,IAAI,CAAC9B,qBAAqB,CAAC0D,SAAS,CAAC;YAC7EC,aAAa,EAAEP,YAAY;YAC3BJ,OAAO,EAAE,IAAI,CAACtD,cAAc;YAC5BmB,OAAO,EAAE2F,aAAa,CAAC5E,gBAAgB;YACvCV,KAAK,EAAEsF,aAAa,CAACtF;UACvB,CAAC;UACDkF,WAAW,GAAG,IAAI,CAAChG,QAAQ,CAAC6F,aAAa,EAAEmB,uBAA8B,CAAC;UAC1E;QACF;MACA;QAAS;UACP,MAAM,IAAIzG,KAAK,CAAE,8CAA6CoF,aAAc,EAAC,CAAC;QAChF;IACF;IAEA,OAAO,IAAIlC,OAAO,CAAI,CAACC,OAAO,EAAEC,MAAM,KAAK;MACzC,IAAIC,YAA2C,GAAG,IAAI;MACtD,MAAMC,cAAc,GAAG,MAAOC,KAAsB,IAAK;QACvD,IAAIF,YAAY,EAAE;UAChBA,YAAY,CAACG,MAAM,CAAC,CAAC;QACvB;QACA,MAAMC,OAAO,GAAGF,KAAK,CAACN,GAAG;QACzB,IAAIQ,OAAO,CAACC,UAAU,CAACjB,YAAY,CAAC,EAAE;UACpC,MAAMkB,iBAAiB,GAAG,IAAI9D,eAAe,CAC3C4D,OAAO,CAACG,SAAS,CAACH,OAAO,CAACI,OAAO,CAAC,GAAG,CAAC,GAAG,CAAC,CAC5C,CAAC;UACD,MAAMC,SAAS,GAAGH,iBAAiB,CAACI,GAAG,CAAC,WAAW,CAAC;UACpD,MAAMC,YAAY,GAAGL,iBAAiB,CAACI,GAAG,CAAC,cAAc,CAAC;UAC1D,IAAID,SAAS,EAAE;YACb,OAAOV,MAAM,CACX,IAAIpD,KAAK,CACN,WAAUoF,aAAc,YACvBpB,YAAY,IAAI,eACjB,WAAUF,SAAU,GACvB,CACF,CAAC;UACH;UACA,MAAM4C,aAAa,GAAG/C,iBAAiB,CAACI,GAAG,CAAC,OAAO,CAAC;UACpD,MAAM4C,YAAY,GAAGhD,iBAAiB,CAACI,GAAG,CAAC,MAAM,CAAC;UAClD,IAAI,CAAC2C,aAAa,IAAI,CAACC,YAAY,EAAE;YACnC,OAAOvD,MAAM,CACX,IAAIpD,KAAK,CAAE,WAAUoF,aAAc,6CAA4C,CACjF,CAAC;UACH;UACA,MAAMwB,eAAe,GAAG,IAAI,CAACvF,cAAc,CACzCsF,YAAY,EACZD,aAAa,EACb,IAAI,CAACxH,8BACP,CAAC;UACD,IAAI,CAAC0H,eAAe,EAAE;YACpB,OAAOxD,MAAM,CACX,IAAIpD,KAAK,CACN,WAAUoF,aAAc,yDAC3B,CACF,CAAC;UACH;UACAjC,OAAO,CAACyD,eAAoB,CAAC;QAC/B,CAAC,MAAM;UACLxD,MAAM,CAAC,IAAIpD,KAAK,CAAE,WAAUoF,aAAc,4BAA2B,CAAC,CAAC;QACzE;MACF,CAAC;MACD/B,YAAY,GAAGiB,oBAAO,CAACC,gBAAgB,CAAC,KAAK,EAAEjB,cAAc,CAAC;MAC9DgB,oBAAO,CAACE,OAAO,CAACiB,WAAW,CAAC,CAAChB,KAAK,CAACC,GAAG,IAAI;QACxC,IAAIrB,YAAY,EAAE;UAChBA,YAAY,CAACG,MAAM,CAAC,CAAC;QACvB;QACAJ,MAAM,CACJ,IAAIpD,KAAK,CAAE,8BAA6BoF,aAAc,KAAIV,GAAG,CAACC,OAAQ,oBAAmB,CAC3F,CAAC;MACH,CAAC,CAAC;IACJ,CAAC,CAAC;EACJ;AACF;AAACxG,OAAA,CAAAU,eAAA,GAAAA,eAAA"}
@@ -0,0 +1,6 @@
1
+ "use strict";
2
+
3
+ Object.defineProperty(exports, "__esModule", {
4
+ value: true
5
+ });
6
+ //# sourceMappingURL=types.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"names":[],"sourceRoot":"../../src","sources":["types.ts"],"mappings":""}
@@ -0,0 +1,239 @@
1
+ import { WalletConnector, solana, solanaDevnet, solanaTestnet } from '@reown/appkit-common-react-native';
2
+ import nacl from 'tweetnacl';
3
+ import bs58 from 'bs58';
4
+ import { PhantomProvider, SOLANA_SIGNING_METHODS } from '../providers/PhantomProvider';
5
+ const SOLANA_CLUSTER_TO_CHAIN_ID_PART = {
6
+ 'mainnet-beta': solana.id,
7
+ 'testnet': solanaTestnet.id,
8
+ 'devnet': solanaDevnet.id
9
+ };
10
+ const PHANTOM_CONNECTOR_STORAGE_KEY = '@appkit/phantom-connector-data';
11
+ const DAPP_KEYPAIR_STORAGE_KEY = '@appkit/phantom-dapp-secret-key';
12
+ export class PhantomConnector extends WalletConnector {
13
+ currentCaipNetworkId = null;
14
+ static SUPPORTED_NAMESPACE = 'solana';
15
+ constructor(config) {
16
+ super({
17
+ type: 'phantom'
18
+ });
19
+ this.config = config ?? {
20
+ cluster: 'mainnet-beta'
21
+ };
22
+ }
23
+ async init(ops) {
24
+ super.init(ops);
25
+ this.storage = ops.storage;
26
+ await this.initializeKeyPair();
27
+ const appScheme = ops.metadata.redirect?.universal;
28
+ if (!appScheme) {
29
+ throw new Error('Phantom Connector: No universal link found in metadata. Please add redirect.universal to the metadata.');
30
+ }
31
+ const providerConfig = {
32
+ appScheme,
33
+ dappUrl: ops.metadata.url,
34
+ storage: ops.storage,
35
+ dappEncryptionKeyPair: this.dappEncryptionKeyPair
36
+ };
37
+ this.provider = new PhantomProvider(providerConfig);
38
+ this.restoreSession();
39
+ }
40
+ async initializeKeyPair() {
41
+ try {
42
+ const secretKeyB58 = await this.getStorage().getItem(DAPP_KEYPAIR_STORAGE_KEY);
43
+ if (secretKeyB58) {
44
+ const secretKey = bs58.decode(secretKeyB58);
45
+ this.dappEncryptionKeyPair = nacl.box.keyPair.fromSecretKey(secretKey);
46
+ } else {
47
+ const newKeyPair = nacl.box.keyPair();
48
+ this.dappEncryptionKeyPair = newKeyPair;
49
+ await this.getStorage().setItem(DAPP_KEYPAIR_STORAGE_KEY, bs58.encode(newKeyPair.secretKey));
50
+ }
51
+ } catch (error) {
52
+ // disconnect and clear session
53
+ await this.disconnect();
54
+ throw error;
55
+ }
56
+ }
57
+ async connect(opts) {
58
+ if (this.isConnected()) {
59
+ return this.namespaces;
60
+ }
61
+ const defaultChain = opts?.defaultChain?.split(':')?.[0] === 'solana' ? opts?.defaultChain?.split(':')[1] : opts?.namespaces?.['solana']?.chains?.[0]?.split(':')[1];
62
+ const requestedCluster = this.config.cluster ?? Object.keys(SOLANA_CLUSTER_TO_CHAIN_ID_PART).find(key => SOLANA_CLUSTER_TO_CHAIN_ID_PART[key] === defaultChain);
63
+ try {
64
+ const connectResult = await this.getProvider().connect({
65
+ cluster: requestedCluster
66
+ });
67
+ const solanaChainIdPart = SOLANA_CLUSTER_TO_CHAIN_ID_PART[connectResult.cluster];
68
+ if (!solanaChainIdPart) {
69
+ throw new Error(`Phantom Connect: Internal - Unknown cluster mapping for ${connectResult.cluster}`);
70
+ }
71
+ this.currentCaipNetworkId = `solana:${solanaChainIdPart}`;
72
+ this.wallet = {
73
+ name: 'Phantom Wallet',
74
+ id: 'phantom-wallet'
75
+ };
76
+ const userPublicKey = this.getProvider().getUserPublicKey();
77
+ if (!userPublicKey) {
78
+ throw new Error('Phantom Connect: Provider failed to return a user public key.');
79
+ }
80
+ const caipAddress = `${this.currentCaipNetworkId}:${userPublicKey}`;
81
+ this.namespaces = {
82
+ [PhantomConnector.SUPPORTED_NAMESPACE]: {
83
+ accounts: [caipAddress],
84
+ methods: Object.values(SOLANA_SIGNING_METHODS),
85
+ events: [],
86
+ chains: [this.currentCaipNetworkId]
87
+ }
88
+ };
89
+ await this.saveSession(); // Save connector-specific session on successful connect
90
+
91
+ return this.namespaces;
92
+ } catch (error) {
93
+ this.clearSession();
94
+ throw error;
95
+ }
96
+ }
97
+ async disconnect() {
98
+ if (!this.isConnected()) {
99
+ return Promise.resolve();
100
+ }
101
+ try {
102
+ await this.getProvider().disconnect();
103
+ } catch (error) {
104
+ // console.warn(`PhantomConnector: Error during provider disconnect: ${error.message}. Proceeding with local clear.`);
105
+ }
106
+ await this.clearSession();
107
+ }
108
+ async clearSession() {
109
+ this.namespaces = undefined;
110
+ this.wallet = undefined;
111
+ this.currentCaipNetworkId = null;
112
+ await this.clearSessionStorage();
113
+ }
114
+ getProvider() {
115
+ if (!this.provider) {
116
+ throw new Error('Phantom Connector: Provider not initialized. Call init() first.');
117
+ }
118
+ return this.provider;
119
+ }
120
+ getStorage() {
121
+ if (!this.storage) {
122
+ throw new Error('Phantom Connector: Storage not initialized. Call init() first.');
123
+ }
124
+ return this.storage;
125
+ }
126
+ getNamespaces() {
127
+ if (!this.namespaces) {
128
+ throw new Error('Phantom Connector: Not connected. Call connect() first.');
129
+ }
130
+ return this.namespaces;
131
+ }
132
+ getChainId(namespace) {
133
+ if (namespace === PhantomConnector.SUPPORTED_NAMESPACE) {
134
+ return this.currentCaipNetworkId ?? undefined;
135
+ }
136
+ return undefined;
137
+ }
138
+ getWalletInfo() {
139
+ if (!this.isConnected()) {
140
+ return undefined;
141
+ }
142
+ return this.wallet;
143
+ }
144
+ isConnected() {
145
+ // Rely solely on the provider as the source of truth for connection status.
146
+ return this.getProvider().isConnected() && !!this.getProvider().getUserPublicKey();
147
+ }
148
+ async switchNetwork(network) {
149
+ const targetClusterName = Object.keys(SOLANA_CLUSTER_TO_CHAIN_ID_PART).find(key => SOLANA_CLUSTER_TO_CHAIN_ID_PART[key] === network.id);
150
+ if (!targetClusterName) {
151
+ throw new Error(`Cannot switch to unsupported network ID: ${network.id}`);
152
+ }
153
+ const currentClusterName = Object.keys(SOLANA_CLUSTER_TO_CHAIN_ID_PART).find(key => `solana:${SOLANA_CLUSTER_TO_CHAIN_ID_PART[key]}` === this.currentCaipNetworkId);
154
+ if (targetClusterName === currentClusterName && this.isConnected()) {
155
+ return Promise.resolve();
156
+ }
157
+
158
+ // For deeplink wallets, switching network effectively means re-connecting to the new cluster.
159
+ // We can try to disconnect the current session and then initiate a new connection.
160
+ // console.log(`Attempting to switch network to: ${targetClusterName}`);
161
+ await this.disconnect(); // Clear current session
162
+
163
+ // Create a temporary options object to guide the new connection
164
+ const tempConnectOpts = {
165
+ defaultChain: `solana:${SOLANA_CLUSTER_TO_CHAIN_ID_PART[targetClusterName]}`
166
+ };
167
+
168
+ // Attempt to connect to the new cluster
169
+ // The connect method will use the defaultChain from opts to determine the cluster.
170
+ await this.connect(tempConnectOpts);
171
+
172
+ // Verify if the connection was successful and to the correct new network
173
+ if (!this.isConnected() || this.getChainId(PhantomConnector.SUPPORTED_NAMESPACE) !== tempConnectOpts.defaultChain) {
174
+ throw new Error(`Failed to switch network to ${targetClusterName}. Please try connecting manually.`);
175
+ }
176
+ }
177
+
178
+ // Orchestrates session restoration
179
+ async restoreSession() {
180
+ try {
181
+ const providerSession = await this.getProvider().restoreSession();
182
+ if (!providerSession) {
183
+ return false;
184
+ }
185
+
186
+ // If provider session is restored, try to restore connector data
187
+ const connectorData = await this.getStorage().getItem(PHANTOM_CONNECTOR_STORAGE_KEY);
188
+ if (!connectorData) {
189
+ return false; // Provider session exists but connector data is missing
190
+ }
191
+
192
+ this.namespaces = connectorData.namespaces;
193
+ this.wallet = connectorData.wallet;
194
+ this.currentCaipNetworkId = connectorData.currentCaipNetworkId;
195
+
196
+ // await this.initializeKeyPair();
197
+
198
+ // Final validation
199
+ if (this.isConnected()) {
200
+ return true;
201
+ }
202
+
203
+ // If validation fails, something is out of sync. Clear everything.
204
+ await this.disconnect();
205
+ return false;
206
+ } catch (error) {
207
+ // On any error, disconnect to ensure a clean state
208
+ await this.disconnect();
209
+ return false;
210
+ }
211
+ }
212
+
213
+ // Saves only connector-specific data
214
+ async saveSession() {
215
+ if (!this.namespaces || !this.wallet || !this.currentCaipNetworkId) {
216
+ return;
217
+ }
218
+ const connectorData = {
219
+ namespaces: this.namespaces,
220
+ wallet: this.wallet,
221
+ currentCaipNetworkId: this.currentCaipNetworkId
222
+ };
223
+ try {
224
+ await this.getStorage().setItem(PHANTOM_CONNECTOR_STORAGE_KEY, connectorData);
225
+ } catch (error) {
226
+ // console.error('PhantomConnector: Failed to save session.', error);
227
+ }
228
+ }
229
+
230
+ // Clears only connector-specific data from storage
231
+ async clearSessionStorage() {
232
+ try {
233
+ await this.getStorage().removeItem(PHANTOM_CONNECTOR_STORAGE_KEY);
234
+ } catch (error) {
235
+ // console.error('PhantomConnector: Failed to clear session from storage.', error);
236
+ }
237
+ }
238
+ }
239
+ //# sourceMappingURL=PhantomConnector.js.map