@web3auth/no-modal 9.0.0-alpha.0 → 9.0.0-alpha.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -62,7 +62,7 @@ await web3auth.init();
62
62
  Once you're done initialising, just create a button that triggers login for your preferred social channel for the user on their request. You can further use the returned provider for making RPC calls to the blockchain.
63
63
 
64
64
  ```js
65
- const web3authProvider = await web3auth.connectTo("openlogin", {
65
+ const web3authProvider = await web3auth.connectTo("auth", {
66
66
  loginProvider: "google",
67
67
  });
68
68
  ```
@@ -3,9 +3,9 @@
3
3
  var _objectSpread = require('@babel/runtime/helpers/objectSpread2');
4
4
  var _defineProperty = require('@babel/runtime/helpers/defineProperty');
5
5
  var auth = require('@web3auth/auth');
6
+ var authAdapter = require('@web3auth/auth-adapter');
6
7
  var base = require('@web3auth/base');
7
8
  var baseProvider = require('@web3auth/base-provider');
8
- var openloginAdapter = require('@web3auth/openlogin-adapter');
9
9
  var deepmerge = require('deepmerge');
10
10
 
11
11
  const ADAPTER_CACHE_KEY = "Web3Auth-cachedAdapter";
@@ -80,8 +80,8 @@ class Web3AuthNoModal extends auth.SafeEventEmitter {
80
80
  useCoreKitKey: this.coreOptions.useCoreKitKey
81
81
  });
82
82
  }
83
- if (adapterName === base.WALLET_ADAPTERS.OPENLOGIN) {
84
- const openloginAdapter$1 = this.walletAdapters[adapterName];
83
+ if (adapterName === base.WALLET_ADAPTERS.AUTH) {
84
+ const authAdapter$1 = this.walletAdapters[adapterName];
85
85
  const {
86
86
  whitelabel
87
87
  } = projectConfig;
@@ -93,9 +93,9 @@ class Web3AuthNoModal extends auth.SafeEventEmitter {
93
93
  key_export_enabled: keyExportEnabled
94
94
  } = projectConfig;
95
95
  if (smsOtpEnabled !== undefined) {
96
- openloginAdapter$1.setAdapterSettings({
96
+ authAdapter$1.setAdapterSettings({
97
97
  loginConfig: {
98
- [openloginAdapter.LOGIN_PROVIDER.SMS_PASSWORDLESS]: {
98
+ [authAdapter.LOGIN_PROVIDER.SMS_PASSWORDLESS]: {
99
99
  showOnModal: smsOtpEnabled,
100
100
  showOnDesktop: smsOtpEnabled,
101
101
  showOnMobile: smsOtpEnabled,
@@ -105,7 +105,7 @@ class Web3AuthNoModal extends auth.SafeEventEmitter {
105
105
  });
106
106
  }
107
107
  if (whitelist) {
108
- openloginAdapter$1.setAdapterSettings({
108
+ authAdapter$1.setAdapterSettings({
109
109
  originData: whitelist.signed_urls
110
110
  });
111
111
  }
@@ -115,18 +115,18 @@ class Web3AuthNoModal extends auth.SafeEventEmitter {
115
115
  this.commonJRPCProvider.setKeyExportFlag(keyExportEnabled);
116
116
  }
117
117
  if (this.coreOptions.privateKeyProvider) {
118
- if (openloginAdapter$1.currentChainNamespace !== this.coreOptions.privateKeyProvider.currentChainConfig.chainNamespace) {
119
- throw base.WalletInitializationError.incompatibleChainNameSpace("private key provider is not compatible with provided chainNamespace for openlogin adapter");
118
+ if (authAdapter$1.currentChainNamespace !== this.coreOptions.privateKeyProvider.currentChainConfig.chainNamespace) {
119
+ throw base.WalletInitializationError.incompatibleChainNameSpace("private key provider is not compatible with provided chainNamespace for auth adapter");
120
120
  }
121
- openloginAdapter$1.setAdapterSettings({
121
+ authAdapter$1.setAdapterSettings({
122
122
  privateKeyProvider: this.coreOptions.privateKeyProvider
123
123
  });
124
124
  }
125
- openloginAdapter$1.setAdapterSettings({
125
+ authAdapter$1.setAdapterSettings({
126
126
  whiteLabel: this.coreOptions.uiConfig
127
127
  });
128
- if (!openloginAdapter$1.privateKeyProvider) {
129
- throw base.WalletInitializationError.invalidParams("privateKeyProvider is required for openlogin adapter");
128
+ if (!authAdapter$1.privateKeyProvider) {
129
+ throw base.WalletInitializationError.invalidParams("privateKeyProvider is required for auth adapter");
130
130
  }
131
131
  } else if (adapterName === base.WALLET_ADAPTERS.WALLET_CONNECT_V2) {
132
132
  const walletConnectAdapter = this.walletAdapters[adapterName];
@@ -218,7 +218,7 @@ class Web3AuthNoModal extends auth.SafeEventEmitter {
218
218
  }
219
219
  async enableMFA(loginParams) {
220
220
  if (this.status !== base.ADAPTER_STATUS.CONNECTED || !this.connectedAdapterName) throw base.WalletLoginError.notConnectedError(`No wallet is connected`);
221
- if (this.connectedAdapterName !== base.WALLET_ADAPTERS.OPENLOGIN) throw base.WalletLoginError.unsupportedOperation(`EnableMFA is not supported for this adapter.`);
221
+ if (this.connectedAdapterName !== base.WALLET_ADAPTERS.AUTH) throw base.WalletLoginError.unsupportedOperation(`EnableMFA is not supported for this adapter.`);
222
222
  return this.walletAdapters[this.connectedAdapterName].enableMFA(loginParams);
223
223
  }
224
224
  async authenticateUser() {
@@ -317,13 +317,13 @@ class Web3AuthNoModal extends auth.SafeEventEmitter {
317
317
  }
318
318
  if (plugin.status === base.PLUGIN_STATUS.CONNECTED) return;
319
319
  const {
320
- openloginInstance
320
+ authInstance
321
321
  } = this.walletAdapters[this.connectedAdapterName];
322
322
  const {
323
323
  options,
324
324
  sessionId,
325
325
  sessionNamespace
326
- } = openloginInstance || {};
326
+ } = authInstance || {};
327
327
  await plugin.initWithWeb3Auth(this, options.whiteLabel);
328
328
  await plugin.connect({
329
329
  sessionId,
@@ -1,9 +1,9 @@
1
1
  import _objectSpread from '@babel/runtime/helpers/objectSpread2';
2
2
  import _defineProperty from '@babel/runtime/helpers/defineProperty';
3
3
  import { SafeEventEmitter } from '@web3auth/auth';
4
+ import { LOGIN_PROVIDER } from '@web3auth/auth-adapter';
4
5
  import { ADAPTER_STATUS, WalletInitializationError, log, CHAIN_NAMESPACES, storageAvailable, getChainConfig, fetchProjectConfig, WALLET_ADAPTERS, cloneDeep, ADAPTER_EVENTS, ADAPTER_NAMESPACES, WalletLoginError, PLUGIN_NAMESPACES, PLUGIN_STATUS } from '@web3auth/base';
5
6
  import { CommonJRPCProvider } from '@web3auth/base-provider';
6
- import { LOGIN_PROVIDER } from '@web3auth/openlogin-adapter';
7
7
  import deepmerge from 'deepmerge';
8
8
 
9
9
  const ADAPTER_CACHE_KEY = "Web3Auth-cachedAdapter";
@@ -78,8 +78,8 @@ class Web3AuthNoModal extends SafeEventEmitter {
78
78
  useCoreKitKey: this.coreOptions.useCoreKitKey
79
79
  });
80
80
  }
81
- if (adapterName === WALLET_ADAPTERS.OPENLOGIN) {
82
- const openloginAdapter = this.walletAdapters[adapterName];
81
+ if (adapterName === WALLET_ADAPTERS.AUTH) {
82
+ const authAdapter = this.walletAdapters[adapterName];
83
83
  const {
84
84
  whitelabel
85
85
  } = projectConfig;
@@ -91,7 +91,7 @@ class Web3AuthNoModal extends SafeEventEmitter {
91
91
  key_export_enabled: keyExportEnabled
92
92
  } = projectConfig;
93
93
  if (smsOtpEnabled !== undefined) {
94
- openloginAdapter.setAdapterSettings({
94
+ authAdapter.setAdapterSettings({
95
95
  loginConfig: {
96
96
  [LOGIN_PROVIDER.SMS_PASSWORDLESS]: {
97
97
  showOnModal: smsOtpEnabled,
@@ -103,7 +103,7 @@ class Web3AuthNoModal extends SafeEventEmitter {
103
103
  });
104
104
  }
105
105
  if (whitelist) {
106
- openloginAdapter.setAdapterSettings({
106
+ authAdapter.setAdapterSettings({
107
107
  originData: whitelist.signed_urls
108
108
  });
109
109
  }
@@ -113,18 +113,18 @@ class Web3AuthNoModal extends SafeEventEmitter {
113
113
  this.commonJRPCProvider.setKeyExportFlag(keyExportEnabled);
114
114
  }
115
115
  if (this.coreOptions.privateKeyProvider) {
116
- if (openloginAdapter.currentChainNamespace !== this.coreOptions.privateKeyProvider.currentChainConfig.chainNamespace) {
117
- throw WalletInitializationError.incompatibleChainNameSpace("private key provider is not compatible with provided chainNamespace for openlogin adapter");
116
+ if (authAdapter.currentChainNamespace !== this.coreOptions.privateKeyProvider.currentChainConfig.chainNamespace) {
117
+ throw WalletInitializationError.incompatibleChainNameSpace("private key provider is not compatible with provided chainNamespace for auth adapter");
118
118
  }
119
- openloginAdapter.setAdapterSettings({
119
+ authAdapter.setAdapterSettings({
120
120
  privateKeyProvider: this.coreOptions.privateKeyProvider
121
121
  });
122
122
  }
123
- openloginAdapter.setAdapterSettings({
123
+ authAdapter.setAdapterSettings({
124
124
  whiteLabel: this.coreOptions.uiConfig
125
125
  });
126
- if (!openloginAdapter.privateKeyProvider) {
127
- throw WalletInitializationError.invalidParams("privateKeyProvider is required for openlogin adapter");
126
+ if (!authAdapter.privateKeyProvider) {
127
+ throw WalletInitializationError.invalidParams("privateKeyProvider is required for auth adapter");
128
128
  }
129
129
  } else if (adapterName === WALLET_ADAPTERS.WALLET_CONNECT_V2) {
130
130
  const walletConnectAdapter = this.walletAdapters[adapterName];
@@ -216,7 +216,7 @@ class Web3AuthNoModal extends SafeEventEmitter {
216
216
  }
217
217
  async enableMFA(loginParams) {
218
218
  if (this.status !== ADAPTER_STATUS.CONNECTED || !this.connectedAdapterName) throw WalletLoginError.notConnectedError(`No wallet is connected`);
219
- if (this.connectedAdapterName !== WALLET_ADAPTERS.OPENLOGIN) throw WalletLoginError.unsupportedOperation(`EnableMFA is not supported for this adapter.`);
219
+ if (this.connectedAdapterName !== WALLET_ADAPTERS.AUTH) throw WalletLoginError.unsupportedOperation(`EnableMFA is not supported for this adapter.`);
220
220
  return this.walletAdapters[this.connectedAdapterName].enableMFA(loginParams);
221
221
  }
222
222
  async authenticateUser() {
@@ -315,13 +315,13 @@ class Web3AuthNoModal extends SafeEventEmitter {
315
315
  }
316
316
  if (plugin.status === PLUGIN_STATUS.CONNECTED) return;
317
317
  const {
318
- openloginInstance
318
+ authInstance
319
319
  } = this.walletAdapters[this.connectedAdapterName];
320
320
  const {
321
321
  options,
322
322
  sessionId,
323
323
  sessionNamespace
324
- } = openloginInstance || {};
324
+ } = authInstance || {};
325
325
  await plugin.initWithWeb3Auth(this, options.whiteLabel);
326
326
  await plugin.connect({
327
327
  sessionId,
@@ -62,12 +62,12 @@ const defineProperty_namespaceObject = require("@babel/runtime/helpers/definePro
62
62
  var defineProperty_default = /*#__PURE__*/__webpack_require__.n(defineProperty_namespaceObject);
63
63
  ;// CONCATENATED MODULE: external "@web3auth/auth"
64
64
  const auth_namespaceObject = require("@web3auth/auth");
65
+ ;// CONCATENATED MODULE: external "@web3auth/auth-adapter"
66
+ const auth_adapter_namespaceObject = require("@web3auth/auth-adapter");
65
67
  ;// CONCATENATED MODULE: external "@web3auth/base"
66
68
  const base_namespaceObject = require("@web3auth/base");
67
69
  ;// CONCATENATED MODULE: external "@web3auth/base-provider"
68
70
  const base_provider_namespaceObject = require("@web3auth/base-provider");
69
- ;// CONCATENATED MODULE: external "@web3auth/openlogin-adapter"
70
- const openlogin_adapter_namespaceObject = require("@web3auth/openlogin-adapter");
71
71
  ;// CONCATENATED MODULE: external "deepmerge"
72
72
  const external_deepmerge_namespaceObject = require("deepmerge");
73
73
  var external_deepmerge_default = /*#__PURE__*/__webpack_require__.n(external_deepmerge_namespaceObject);
@@ -151,8 +151,8 @@ class Web3AuthNoModal extends auth_namespaceObject.SafeEventEmitter {
151
151
  useCoreKitKey: this.coreOptions.useCoreKitKey
152
152
  });
153
153
  }
154
- if (adapterName === base_namespaceObject.WALLET_ADAPTERS.OPENLOGIN) {
155
- const openloginAdapter = this.walletAdapters[adapterName];
154
+ if (adapterName === base_namespaceObject.WALLET_ADAPTERS.AUTH) {
155
+ const authAdapter = this.walletAdapters[adapterName];
156
156
  const {
157
157
  whitelabel
158
158
  } = projectConfig;
@@ -164,9 +164,9 @@ class Web3AuthNoModal extends auth_namespaceObject.SafeEventEmitter {
164
164
  key_export_enabled: keyExportEnabled
165
165
  } = projectConfig;
166
166
  if (smsOtpEnabled !== undefined) {
167
- openloginAdapter.setAdapterSettings({
167
+ authAdapter.setAdapterSettings({
168
168
  loginConfig: {
169
- [openlogin_adapter_namespaceObject.LOGIN_PROVIDER.SMS_PASSWORDLESS]: {
169
+ [auth_adapter_namespaceObject.LOGIN_PROVIDER.SMS_PASSWORDLESS]: {
170
170
  showOnModal: smsOtpEnabled,
171
171
  showOnDesktop: smsOtpEnabled,
172
172
  showOnMobile: smsOtpEnabled,
@@ -176,7 +176,7 @@ class Web3AuthNoModal extends auth_namespaceObject.SafeEventEmitter {
176
176
  });
177
177
  }
178
178
  if (whitelist) {
179
- openloginAdapter.setAdapterSettings({
179
+ authAdapter.setAdapterSettings({
180
180
  originData: whitelist.signed_urls
181
181
  });
182
182
  }
@@ -186,18 +186,18 @@ class Web3AuthNoModal extends auth_namespaceObject.SafeEventEmitter {
186
186
  this.commonJRPCProvider.setKeyExportFlag(keyExportEnabled);
187
187
  }
188
188
  if (this.coreOptions.privateKeyProvider) {
189
- if (openloginAdapter.currentChainNamespace !== this.coreOptions.privateKeyProvider.currentChainConfig.chainNamespace) {
190
- throw base_namespaceObject.WalletInitializationError.incompatibleChainNameSpace("private key provider is not compatible with provided chainNamespace for openlogin adapter");
189
+ if (authAdapter.currentChainNamespace !== this.coreOptions.privateKeyProvider.currentChainConfig.chainNamespace) {
190
+ throw base_namespaceObject.WalletInitializationError.incompatibleChainNameSpace("private key provider is not compatible with provided chainNamespace for auth adapter");
191
191
  }
192
- openloginAdapter.setAdapterSettings({
192
+ authAdapter.setAdapterSettings({
193
193
  privateKeyProvider: this.coreOptions.privateKeyProvider
194
194
  });
195
195
  }
196
- openloginAdapter.setAdapterSettings({
196
+ authAdapter.setAdapterSettings({
197
197
  whiteLabel: this.coreOptions.uiConfig
198
198
  });
199
- if (!openloginAdapter.privateKeyProvider) {
200
- throw base_namespaceObject.WalletInitializationError.invalidParams("privateKeyProvider is required for openlogin adapter");
199
+ if (!authAdapter.privateKeyProvider) {
200
+ throw base_namespaceObject.WalletInitializationError.invalidParams("privateKeyProvider is required for auth adapter");
201
201
  }
202
202
  } else if (adapterName === base_namespaceObject.WALLET_ADAPTERS.WALLET_CONNECT_V2) {
203
203
  const walletConnectAdapter = this.walletAdapters[adapterName];
@@ -289,7 +289,7 @@ class Web3AuthNoModal extends auth_namespaceObject.SafeEventEmitter {
289
289
  }
290
290
  async enableMFA(loginParams) {
291
291
  if (this.status !== base_namespaceObject.ADAPTER_STATUS.CONNECTED || !this.connectedAdapterName) throw base_namespaceObject.WalletLoginError.notConnectedError(`No wallet is connected`);
292
- if (this.connectedAdapterName !== base_namespaceObject.WALLET_ADAPTERS.OPENLOGIN) throw base_namespaceObject.WalletLoginError.unsupportedOperation(`EnableMFA is not supported for this adapter.`);
292
+ if (this.connectedAdapterName !== base_namespaceObject.WALLET_ADAPTERS.AUTH) throw base_namespaceObject.WalletLoginError.unsupportedOperation(`EnableMFA is not supported for this adapter.`);
293
293
  return this.walletAdapters[this.connectedAdapterName].enableMFA(loginParams);
294
294
  }
295
295
  async authenticateUser() {
@@ -388,13 +388,13 @@ class Web3AuthNoModal extends auth_namespaceObject.SafeEventEmitter {
388
388
  }
389
389
  if (plugin.status === base_namespaceObject.PLUGIN_STATUS.CONNECTED) return;
390
390
  const {
391
- openloginInstance
391
+ authInstance
392
392
  } = this.walletAdapters[this.connectedAdapterName];
393
393
  const {
394
394
  options,
395
395
  sessionId,
396
396
  sessionNamespace
397
- } = openloginInstance || {};
397
+ } = authInstance || {};
398
398
  await plugin.initWithWeb3Auth(this, options.whiteLabel);
399
399
  await plugin.connect({
400
400
  sessionId,
@@ -1,9 +1,9 @@
1
1
  import _objectSpread from '@babel/runtime/helpers/objectSpread2';
2
2
  import _defineProperty from '@babel/runtime/helpers/defineProperty';
3
3
  import { SafeEventEmitter } from '@web3auth/auth';
4
+ import { LOGIN_PROVIDER } from '@web3auth/auth-adapter';
4
5
  import { ADAPTER_STATUS, WalletInitializationError, log, CHAIN_NAMESPACES, storageAvailable, getChainConfig, fetchProjectConfig, WALLET_ADAPTERS, cloneDeep, ADAPTER_EVENTS, ADAPTER_NAMESPACES, WalletLoginError, PLUGIN_NAMESPACES, PLUGIN_STATUS } from '@web3auth/base';
5
6
  import { CommonJRPCProvider } from '@web3auth/base-provider';
6
- import { LOGIN_PROVIDER } from '@web3auth/openlogin-adapter';
7
7
  import deepmerge from 'deepmerge';
8
8
 
9
9
  const ADAPTER_CACHE_KEY = "Web3Auth-cachedAdapter";
@@ -78,8 +78,8 @@ class Web3AuthNoModal extends SafeEventEmitter {
78
78
  useCoreKitKey: this.coreOptions.useCoreKitKey
79
79
  });
80
80
  }
81
- if (adapterName === WALLET_ADAPTERS.OPENLOGIN) {
82
- const openloginAdapter = this.walletAdapters[adapterName];
81
+ if (adapterName === WALLET_ADAPTERS.AUTH) {
82
+ const authAdapter = this.walletAdapters[adapterName];
83
83
  const {
84
84
  whitelabel
85
85
  } = projectConfig;
@@ -91,7 +91,7 @@ class Web3AuthNoModal extends SafeEventEmitter {
91
91
  key_export_enabled: keyExportEnabled
92
92
  } = projectConfig;
93
93
  if (smsOtpEnabled !== undefined) {
94
- openloginAdapter.setAdapterSettings({
94
+ authAdapter.setAdapterSettings({
95
95
  loginConfig: {
96
96
  [LOGIN_PROVIDER.SMS_PASSWORDLESS]: {
97
97
  showOnModal: smsOtpEnabled,
@@ -103,7 +103,7 @@ class Web3AuthNoModal extends SafeEventEmitter {
103
103
  });
104
104
  }
105
105
  if (whitelist) {
106
- openloginAdapter.setAdapterSettings({
106
+ authAdapter.setAdapterSettings({
107
107
  originData: whitelist.signed_urls
108
108
  });
109
109
  }
@@ -113,18 +113,18 @@ class Web3AuthNoModal extends SafeEventEmitter {
113
113
  this.commonJRPCProvider.setKeyExportFlag(keyExportEnabled);
114
114
  }
115
115
  if (this.coreOptions.privateKeyProvider) {
116
- if (openloginAdapter.currentChainNamespace !== this.coreOptions.privateKeyProvider.currentChainConfig.chainNamespace) {
117
- throw WalletInitializationError.incompatibleChainNameSpace("private key provider is not compatible with provided chainNamespace for openlogin adapter");
116
+ if (authAdapter.currentChainNamespace !== this.coreOptions.privateKeyProvider.currentChainConfig.chainNamespace) {
117
+ throw WalletInitializationError.incompatibleChainNameSpace("private key provider is not compatible with provided chainNamespace for auth adapter");
118
118
  }
119
- openloginAdapter.setAdapterSettings({
119
+ authAdapter.setAdapterSettings({
120
120
  privateKeyProvider: this.coreOptions.privateKeyProvider
121
121
  });
122
122
  }
123
- openloginAdapter.setAdapterSettings({
123
+ authAdapter.setAdapterSettings({
124
124
  whiteLabel: this.coreOptions.uiConfig
125
125
  });
126
- if (!openloginAdapter.privateKeyProvider) {
127
- throw WalletInitializationError.invalidParams("privateKeyProvider is required for openlogin adapter");
126
+ if (!authAdapter.privateKeyProvider) {
127
+ throw WalletInitializationError.invalidParams("privateKeyProvider is required for auth adapter");
128
128
  }
129
129
  } else if (adapterName === WALLET_ADAPTERS.WALLET_CONNECT_V2) {
130
130
  const walletConnectAdapter = this.walletAdapters[adapterName];
@@ -216,7 +216,7 @@ class Web3AuthNoModal extends SafeEventEmitter {
216
216
  }
217
217
  async enableMFA(loginParams) {
218
218
  if (this.status !== ADAPTER_STATUS.CONNECTED || !this.connectedAdapterName) throw WalletLoginError.notConnectedError(`No wallet is connected`);
219
- if (this.connectedAdapterName !== WALLET_ADAPTERS.OPENLOGIN) throw WalletLoginError.unsupportedOperation(`EnableMFA is not supported for this adapter.`);
219
+ if (this.connectedAdapterName !== WALLET_ADAPTERS.AUTH) throw WalletLoginError.unsupportedOperation(`EnableMFA is not supported for this adapter.`);
220
220
  return this.walletAdapters[this.connectedAdapterName].enableMFA(loginParams);
221
221
  }
222
222
  async authenticateUser() {
@@ -315,13 +315,13 @@ class Web3AuthNoModal extends SafeEventEmitter {
315
315
  }
316
316
  if (plugin.status === PLUGIN_STATUS.CONNECTED) return;
317
317
  const {
318
- openloginInstance
318
+ authInstance
319
319
  } = this.walletAdapters[this.connectedAdapterName];
320
320
  const {
321
321
  options,
322
322
  sessionId,
323
323
  sessionNamespace
324
- } = openloginInstance || {};
324
+ } = authInstance || {};
325
325
  await plugin.initWithWeb3Auth(this, options.whiteLabel);
326
326
  await plugin.connect({
327
327
  sessionId,